Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection
|
|
- Darleen McKinney
- 6 years ago
- Views:
Transcription
1 This paper was presented as part of the main technical program at IEEE INFOCOM 2011 Capacity of Dual-Radio Multi-Channel ireless Sensor Networks for Continuous Data Collection Shouling Ji Department of Computer Science Georgia State University Atlanta, Georgia 30303, USA Yingshu Li Department of Computer Science Georgia State University Atlanta, Georgia 30303, USA Xiaohua Jia Department of Computer Science City University of ong Kong Kowloon, ong Kong Abstract Data collection is an important operation of wireless sensor networks (SNs). The performance of data collection can be measured by its achievable network capacity. Most existing works focus on the capacity of unicast, multicast or snapshot data collection in single-radio single-channel wireless networks, and no dedicated works consider the continuous data collection capacity for SNs in detail under the protocol interference model. In this paper, we first propose a multi-path scheduling algorithm for the snapshot data collection in single-radio multi-channel SNs and prove that its achievable network capacity is at least, 3.63 ρ2 +o(ρ) which is a tighter lower bound compared with the previously best result in [5] which is, where is the bandwidth over a 8ρ 2 channel, is the number of the available orthogonal channels, ρ is the ratio of the interference radius over the transmission radius of a sensor and o(ρ) is a linear equation of ρ. For the continuous data collection problem, although the authors in [5] claim that data collection can be pipelined with existing works, we find that such an idea cannot actually improve network capacity. e explain the reason for this and propose a novel continuous data collection method for dual-radio multi-channel SNs. This method significantly speeds up the data collection process, and achieves a capacity of when e 12, or when M e ( 3.63 e > 12, where n is the number of sensors, M is a constant value and usually M n, and e is the maximum number of leaf nodes having a same parent node in the routing tree (i.e. data collection tree). The simulation results also indicate that the proposed algorithms significantly improve network capacity compared with the existing works. I. INTRODUCTION ireless Sensor Networks (SNs) are mainly used for collecting data from the physical world. Data gathering can be categorized as data aggregation [1], [2], which obtains aggregated values from SNs, and data collection [3]-[5], which gathers all the data from a network without any data aggregation. For data collection, the union of all the sensing values from all the sensors at a particular time instance is called a snapshot [5]. The problem of collecting one snapshot is called snapshot data collection. The problem of collecting multiple continuous snapshots is called continuous data collection. Different from wired networks, SNs suffer from the interference problem, which degrades the network performance. Consequently, network capacity, which can reflect the achievable data transmission rate, is usually used as an important measurement to evaluate network performance. Particularly, for a data collection SN, we use the data receiving rate at the sink, referred as data collection capacity, to measure its achievable network capacity, i.e. data collection capacity reflects how fast data been collected to the sink. After the first work [8], extensive works emerged to study the network capacity issue for variety of network scenarios, e.g. multicast capacity [11], [12], unicast capacity [13], broadcast capacity [19], snapshot data collection capacity [3]-[5] and etc. Most of the previous studies on network capacity are for single-radio single-channel SNs [3]-[5], [8]-[16], where a network consists of a number of nodes with only one radio each and all the nodes communicate over a common single channel. Because of the inherent limitations of such networks, transmissions suffer from the radio confliction problem [6], [7] and the channel interference problem [17], [18], [7] seriously. This degrades network performance significantly. The radio confliction problem is caused by the fact that each node is equipped with only one radio, which means a node can only work on a half-duplex mode, i.e. this node cannot receive and transmit data simultaneously. The channel interference problem is caused by all the nodes working over a common channel. hen one node transmits data, all the other nodes within its interference radius cannot receive any other data and all the other transmissions interfering with this transmission cannot be carried out simultaneously. Fortunately, many current offthe-shelf sensor nodes are capable of working over multiple orthogonal channels, e.g. IEEE b/g standard supports 3 orthogonal channels and IEEE a standard supports 13 orthogonal channels [6] respectively, which can greatly mitigate the channel interference problem. Furthermore, with the development of hardware technologies and the decreasing of hardware cost, a sensor node can be equipped with multiple radios. This helps with solving the radio confliction problem. Different from the previous works which investigate the capacity issues for single-radio single-channel SNs, we study the network capacity problem for both continuous data collection and snapshot data collection in dual-radio multi-channel SNs under the protocol interference model. Meanwhile, the results obtained in this paper can be extended to SNs under the physical interference model [19]. The motivation of this work lies in the fact that dual-radio multi-channel SNs can make nodes work in a full-duplex manner without incurring /11/$ IEEE 1062
2 high hardware cost, while the channel interference problem can be mitigated significantly. To the best of our knowledge, the previous works only address the snapshot data collection capacity problem, and our work is the first dedicated one investigating the continuous data collection capacity problem in detail under the protocol interference model. The main contributions of our work are as follows. For the snapshot data collection problem in singleradio multi-channel SNs, we propose a new multi-path scheduling algorithm. e prove that this algorithm can achieve the order-optimal network capacity Θ( ) and has a tighter lower bound 3.63 ρ2 +o(ρ) compared with the previously best result in [5], which is 8ρ, where is the 2 channel bandwidth, is the number of the orthogonal channels, ρ is the ratio of the interference radius over the transmission radius of a node, and o(ρ) is a linear equation of ρ. Currently, there are no dedicated solutions for the continuous data collection capacity problem in SNs. An intuitive method is to combine a snapshot data collection method with the pipeline technology [5]. owever, this idea does not work for most of the existing works. e explain the reasons for the failure of this idea and show that pipeline with the methods in [4] and [5] cannot improve network capacity. e propose a novel pipeline scheduling algorithm that combines Compressive Data Gathering (CDG) [3] and pipeline together, which significantly improves the continuous data collection capacity for dual-radio multichannel SNs. e also prove that the achievable asymptotic network capacity of this algorithm in a long-run is when e 12, or M e( 3.63 when e > 12, where n is the number of the sensors, M is a constant value and usually M n, and e is the maximum number of the leaf nodes having a same parent in the routing tree (i.e. data collection tree). A straightforward upper bound of a dual-radio SN is 2, since a dual-radio sink can simultaneously receive two packets at most. hereas, thanks to the benefit brought by the pipeline technique, the analysis shows that our pipeline scheduling algorithm can even achieve a capacity higher than 2. The simulation results indicate that the proposed algorithms have a better snapshot data collection capacity compared with the previously best works. The rest of this paper is organized as follows: Section II summarizes the related works. Section III introduces the network model and preliminaries. The multi-channel scheduling algorithm for snapshot data collection in single-radio multi-channel SNs is proposed and analyzed in Section IV. Section V presents a novel multi-channel scheduling algorithm for continuous data collection and its theoretical achievable asymptotic network capacity. The simulations to validate the performance of the proposed algorithms are shown in Section VI and we conclude this paper in Section VII. II. RELATED ORK A. Capacity for Single-Radio Single-Channel ireless Networks The works in [9], [10] focus more on the MAC layer to improve network capacity. In [9], the authors studied the capacity of CSMA wireless networks. They formulated the models of a series of CSMA protocols and study the capacity of CSMA scheduling versus TDMA scheduling. In [10], the authors considered the scheduling problem where all the communication requests are single-hop and all the nodes transmit at a fixed power level. They proposed an algorithm to maximize the number of links in one time-slot. The works in [11]-[14] study the multicast and/or unicast capacity of wireless networks. The multicast capacity for wireless ad hoc networks under the protocol interference model and the Gaussian channel model are investigated in [11] and [12] respectively. In [11], the authors showed that the network multicast capacity is Θ( n log n n k ) when k = O( log n ) and is Θ( ) when k = Ω( n log n ). In [12], the authors showed n that when k θ 1 and n s θ 2 n 1/2+β, the capacity (log n) 2α+6 that each multicast session can achieve is at least c 8 n s k. Considering the problem of characterizing the unicast capacity scaling in arbitrary wireless networks, the authors proposed a general cooperative communication scheme in [13]. A more general casting capacity problem was investigated in [14] for random wireless networks. The snapshot data collection capacity of SNs is studied in [4], [5], and [3]. In [4], the authors considered the collisionfree delay-efficient data gathering problem. They proposed a family of path scheduling algorithms. The authors of [5] extended the work of [4]. They derived tighter upper and lower bounds of the capacity of snapshot data collection for arbitrary SNs. The work in [3] studies how to distribute a data collection task to the entire network to achieve load balancing. In this work, all the sensors transmit the same number of data packets during the data collection process. In [15], a method which decomposes a large network into many small zones is proposed, and then localized scheduling algorithms which can achieve the order optimal capacity are executed in each zone independently. A general framework to characterize the capacity of wireless ad hoc networks with arbitrary mobility patterns is studied in [16]. B. Capacity for Multi-Channel ireless Networks Since wireless nodes can work over multiple orthogonal channels, the issue of the capacity of multi-channel wireless networks also attracts a lot of attention [17], [18], and [7]. In [17], the authors studied the connectivity and capacity problem of multi-channel wireless networks. They considered a multichannel wireless network under the constraints on channel switching, proposed some routing and channel assignment strategies for multiple unicast communications and derived the per-flow capacity. In [18], the authors first proposed a multi-channel network architecture, called MC-MDA, and then obtained the capacity of multiple unicast communications n 1063
3 under arbitrary and random network models. The impact of the number of the channels, the number of the interfaces and the interface switching delay on the capacity of multi-channel wireless networks is investigated in [7]. In this work, the authors derived the network capacity under different situations for arbitrary and random networks. C. Remarks Unlike the above mentioned works, our work has the following two main characteristics. First, most of the above mentioned works are specifically for single-radio single-channel wireless networks, while our work considers dual-radio multichannel SNs. Second, to the best of our knowledge, our work is the first dedicated one that investigates network capacity for continuous data collection in detail under the protocol interference model, whereas most of the previous works study network capacity for multicast or/and unicast and etc. For the works that study the data collection capacity of wireless networks, they only consider snapshot data collection which is just a special case of continuous data collection. III. NETORK MODEL AND PRELIMINARIES A. Network Model e consider a SN consisting of n sensors and one sink, represented by a connected undirected graph G = (V, E), where V is the set of all the nodes in the network and E is the set of all the possible links among the nodes in V. Every sensor in the SN produces one packet in a snapshot. Each sensor has two radios and each radio has a fixed transmission radius normalized to one and a fixed interference radius, denoted by ρ, ρ 1. Since we use the protocol interference model, for any receiving node v, v can successfully receive a packet from a transmitting node u if u v 1 and there is no other node s satisfying s v ρ and trying to transmit a packet simultaneously over the same channel with u. ere is the Euclidean distance. Furthermore, we say two links are interference links if at least one transmission over them will fail if they transmit data simultaneously over a common channel. Each radio can work over orthogonal channels, denoted by λ 1, λ 2,..., λ respectively. A fixed data-rate channel model [5] is adopted in this paper, which means each sensor can transmit at a rate of bits/second over a wireless channel. The size of all the packets transmitted in the network is set to be b bits. e also assume that all the transmissions are synchronized and the size of a time slot is t = b/ seconds. e further give the formal definition of the capacity of data collection. The capacity Υ of data collection is the ratio between the size of the data successfully received by the sink and the time τ used to collect these data, e.g. in a SN consisting of n sensors, the capacity to collect N snapshots of data is Υ = Nnb τ, which is actually the data rate at the sink. B. Routing Tree G is a unit-disk graph representing a SN. e define the sink s 0 as the center of G. The radius of G with respect to s 0 is the maximum depth of the Breadth-First-Search (BFS) tree rooted at s 0. For a subset U of V, U is a Dominating Set (DS) of G if every node in V is either an element of U or adjacent to at least one node in U. If the subgraph of G induced by U is connected, then U is called a Connected Dominating Set (CDS) of G. e build a CDS based on routing tree T using the method proposed in [1]. T is rooted at the sink and can be built according to the following steps. First, obtain a Maximal Independent Set (MIS) D according to the BFS search sequence. Note that D is also a DS of G and an element in D is called a dominator. Let G be a graph on D in which two nodes in D are linked by an edge if and only if these two nodes have a common neighbor in G. Obviously, sink s 0 is in G. Suppose that the radius of G with respect to s 0 is L and we denote the union of dominators at level l(0 l L ) as set D l. Second, we choose nodes, also called connectors, to connect all the nodes in D to form a CDS. Let S l (0 l L ) be the set of the nodes adjacent to at least one node in D l and at least one node in D l+1 and compute a minimal cover C l S l for D l+1. Let C = L 1 0 C l and therefore D C is a CDS of G. Finally, for any other node u, also called a dominatee, not belonging to D C, choose the nearest dominator as u s parent node. Thus, the routing tree T is obtained. For each link in T, the receiving (resp., transmitting) node, i.e. parent (resp., child) node, of this link is called a head (resp., tail). Suppose that A is a set of links of T. The corresponding conflicting graph of A is denoted by R(A) = (V A, E A ), where each link in A is abstracted to a node in V A and two nodes in V A form an edge in E A if the corresponding two links of these two nodes are interference links. Lemma 1 in [1] can be used to derive some useful results of the routing tree T. Lemma 1: [1] Suppose that O is a half-disk with radius r, and U is a set of points with mutual distances of at least one. Then the number of the points β r in a half-disk is β r = U O π 3 r 2 + ( π 2 + 1)r + 1. From Lemma 1, the authors in [1] derived the following properties of the routing tree T. First, for each 0 l L 1, each connector in C l is adjacent to at most 4 dominators in D l+1. Second, for each 1 l L 1, each dominator in D l is adjacent to at most 11 connectors in C l. Third, C C. Vertex Coloring Problem For a graph G = (V, E), the maximum degree (minimum degree) of G is denoted by (G) (δ(g)). A subgraph of G on U V is denoted by G(U). The inductivity of G is defined as δ (G) = max δ(g(u)). A vertex coloring of G is a scheme of U V coloring all the vertices in G such that no two adjacent vertices share the same color. The chromatic number χ(g) of G is the least number of colors used to color G. Deciding the lower bound of χ(g) is a well-known NPC problem. owever, the upper bound of χ(g) has been derived in graph theory [20], [1]. The following lemma was proved in [20] and [1]. Lemma 2: χ(g) 1+δ (G) and a vertex coloring scheme, called first-fit coloring, for G using at most 1 + δ (G) colors 1064
4 can be found in polynomial time. Given a link set A of T, the channel assignment problem for A can be abstracted to the vertex coloring problem for its corresponding conflicting graph R(A). If the tail (resp., head) of every link in A is a dominator, then Lemma 3 in [1] gives the upper bound of δ (A). Lemma 3: [1] δ (A) β ρ+1 1. Lemma 3 implies that in the worst case, at most β ρ+1 channels may be assigned to all the links in A without channel interference by a first-fit coloring method. Fig s 0 1 s 1 0 s 0 1 s 1 1rd 1 s 0 0 s 1 2rd 1 s 0 1 s 1 3rd 2 s 0 0 s 1 4rd 2 s 0 1 s 1 5rd 3 s 0 0 s 1 1 s 2 1 s 3 1 s 2 1 s 3 2 s 2 1 s 2 1 s 2 0 s 2 0 s 2 (a) (b) (a) A single path and (b) its scheduling (rd = round). IV. CAPACITY OF SNAPSOT DATA COLLECTION In this section, we first investigate the traditional snapshot data collection problem, and propose a novel scheduling algorithm with a tighter lower capacity bound for this problem in single-radio multi-channel SNs. Subsequently, we discuss the proposed algorithm further, and point out that the proposed algorithm and most existing works cannot improve network capacity with the pipeline technology. Since at any time slot, the sink can receive data from at most one sensor, the upper bound of the snapshot data collection capacity is [5]. Aiming at this upper bound, we design a scheduling algorithm for snapshot data collection which is order-optimal and has a tighter lower bound than the previously best result [5]. A. Scheduling Algorithm for Snapshot Data Collection In this subsection, we design a new multi-path scheduling algorithm based on the routing tree T built in Section III, which is proven to have a better performance. e first study how to schedule a single path and then extend it to the scheduling of multi-path in T. For simplicity, we introduce the concept of round. A round is a period of time consisting of multiple continuous time slots. e take the path shown in Figure 1(a) as an example to explain the idea of the single path scheduling scheme. In Figure 1(a), the path, denoted by P, consists of one sink s 0 and three sensors s 1, s 2, and s 3, where s 0 and s 2 are dominators, s 1 is a connector, and s 3 is a dominatee. The value marked in each node is the number of the packets at this node to be transmitted. Initially, every sensor on P has one packet and there is no packet at s 0. P o (resp., P e ) denotes the set of links on P whose heads (resp., tails) are dominators and whose tails have at least one packet to be transmitted. e schedule P according to the following two steps and repeat them until all the packets have been collected by s 0. Step 1: In an odd round, schedule every link in P o once, i.e. assign a dedicated channel and one dedicated time slot to each link in P o. Step 2: In an even round, schedule every link in P e once, i.e. assign a dedicated channel and one dedicated time slot to each link in P e. The detailed scheduling in Step 1 can be done in the following way: first, calculate the interference degree i.e. the number of the links interfering with another link, for each link in P o ; second, sort the links in P o according to their interference degrees in a non-decreasing order and denote the resulting link sequence as {l 1, l 2,..., l Po }; finally, during the i-th (1 i ) time slot of a round, let the j- Po th ((i 1) < j i) link in P o work on channel λ j%+1. The detailed scheduling in Step 2 is similar to that of Step 1. The scheduling process of P is shown in Figure 1(b). During the first (odd) round, links (s 3, s 2 ) and (s 1, s 0 ) are scheduled and the packets in s 3 and s 1 are transmitted to their parent nodes. After the first round, s 3 has no packet to transmit. During the second (even) schedule, link (s 2, s 1 ) is scheduled and s 2 transmits one packet to its parent node. This schedule process continues until all the packets on path P has been transmitted to s 0. e now consider the scheduling of the routing tree T built in Section III. Suppose that there are m leaf nodes in T, and the path from leaf node s i (1 i m) to the sink s 0 is denoted by P i. Two paths P i and P j are said intersecting if they have at least one common node besides the sink node. The common node of two intersected paths having the largest number of hops from the sink is called an intersecting point. If path P i intersects with other paths, the route from s i to the nearest intersecting point of s i is called a sub-path, denoted by F i. Otherwise, F i is actually P i. The basic idea of our multi-path scheduling algorithm is as follows: For the non-intersecting paths without wireless interference, schedule them by the single path scheduling algorithm concurrently. For the non-intersecting paths with wireless interference, schedule them according to a certain order. The path with the smallest subscript has the highest priority. For the intersecting paths, schedule them according to a certain order, e.g. if P i is the one of these intersecting paths with the smallest subscript, schedule P i until there is no packet having to be transmitted on the sub-path F i and then continue to schedule the next path. e further explain the multi-path scheduling algorithm by the routing tree shown in Figure 2(a). In Figure 2(a), there are three leaf nodes s 1, s 2, and s 3 and their corresponding paths are P 1, P 2 and P 3, respectively. Path P 1 and path P 3 are not intersecting, therefore they are scheduled concurrently. Since path P 1 and path P 2 are intersecting paths, path P 1 is scheduled first. After no packets on the sub-path F 1 of P 1 have to be transmitted, path P 2 is scheduled as shown in Figure 2(b). 1065
5 Fig. 2. F 1 s 1,P 1 s 0 (sink) s 2,P 2 (a) B. Capacity Analysis s 3,P 3 F 1 s 1,P 1 s 0 (sink) s 2,P 2 s 3,P 3 (b) s 0 (sink) s 2,P 2 (a) A routing tree and (b) its scheduling. The upper bound of the snapshot data collection capacity is which has been explained. Consequently, we focus on the lower bound of the snapshot data collection capacity. In the worst case, all the paths in the routing tree T are intersecting, which means only one path can be scheduled at any time. In order to derive the lower bound of the multi-path scheduling algorithm, we first investigate the number of the rounds needed to finish the scheduling of one single path and then study the number of the time slots in each round. Lemma 4 gives the maximum number of the rounds used for scheduling of one single path. Lemma 4: For a path P of length L, it takes at most 2L 1 rounds to collect all the packets on P at the sink node. Proof: Please refer to [21] of this paper. From Lemma 4, it is straightforward to obtain the number of the rounds used to collect all the data on the sub-path F of P as shown in Corollary 1. Note that the intersecting point also needs one round to transmit its packet. Corollary 1: For the sub-path F of length L s in P, it takes at most 2L s rounds to collect all the packets on F. The maximum number of the time slots in a round is as follows. Lemma 5: A round has at most time slots. Proof: During every odd (resp., even) round, the scheduled links are links in P o (resp., P e ). Since the heads (resp., tails) of links in P o (resp., P e ) are dominators, we can schedule all the links in P o (resp., P e ) in one time slot with at most β ρ+1 channels by Lemma 3 and Lemma 2. Now, we have available channels, which means we can finish the scheduling ρ2 +o(ρ) within time slots. Therefore, the lemma holds. Now we can obtain the lower bound of the achievable capacity of the multi-path scheduling algorithm as shown in Theorem 1. Theorem 1: The capacity Υ at the sink of T of the multipath scheduling algorithm is at least 3.63, which is order-optimal. Proof: Suppose that T has m paths and the length of each path is L i (1 i m). In the worst case, all the m paths cannot be scheduled concurrently. Then by Lemma 4, Corollary 1 and Lemma 5, the total time τ used to collect 2L i i=1 According to the multi-path scheduling algorithm, for any path all the packets of T at the sink is at most t m. P i, the time used to collect packets on P i is equal to the time used to collect packets on the corresponding sub-path F i of P i. Therefore, τ t m m 2L i = 2t F i. i=1 i=1 Since the number of the links in T is equal to the number of the sensors in T, m F i = n. Then, τ 2nt i=1 Therefore, the capacity Υ = nb 3.63 ρ2 +o(ρ) nb τ = 2nt. 2, where o(ρ) is a linear equation of ρ. Since the upper bound of Υ is, Υ is order-optimal. From Theorem 1, the multi-path scheduling algorithm has a tighter lower bond compared with the previously best result in [5], which has a lower bound of 8ρ. 2 C. Discussion hen we address the continuous data collection problem, an intuitive idea is to pipeline the existing snapshot data collection operations [5]. Nevertheless, such an idea cannot achieve a better performance. This is because the sink can receive at most one packet in a time slot. By pipeline, data transmissions at the nodes far from the sink are really accelerated. owever, the fact that a sink can receive at most one packet in each time slot makes the data accumulated at the nodes near the sink. Finally, the network capacity cannot be improved even with pipeline. This motivates us to investigate new methods for continuous data collection. V. CAPACITY OF CONTINUOUS DATA COLLECTION e propose a novel pipeline scheduling algorithm based on compressive data gathering (CDG) [3] for dual-radio multichannel SNs in this section, which augments the continuous data collection capacity significantly. ere we consider dualradio multi-channel SNs because dual radios can make a half-duplex single-radio node work in a full-duplex mode. Note that our pipeline scheduling algorithm can also be used in the single-radio scenario just with a little modification. A. Compressive Data Gathering (CDG) CDG is first proposed in [3] for snapshot data gathering in single-radio single-channel SNs. The basic idea of CDG is to distribute the data collection load uniformly to all the nodes in the entire network. e take the data collection on a path consisting of L sensors s 1, s 2,..., s L and one sink s 0 as shown in Figure 3 [3] as an example to explain CDG. In Figure 3, the packet produced at sensor s j (1 j L) is d j. In the basic data collection shown in Figure 3(a), s 1 transmits one packet d 1 to s 2, s 2 transmits two packets d 1 and d 2 to s 3, and finally all the packets on the path are transmitted to s 0 by s L. To balance the transmission load, the authors in [3] proposed the CDG method as shown in Figure 3(b). Instead of transmitting the original data directly, s 1 multiplies its data with a random coefficient ϕ i1 (1 i M), and sends the M results ϕ i1 d 1 to s 2. Upon receiving ϕ i1 d 1 (1 i M) from s 1, s 2 multiplies its data d 2 with a random coefficient ϕ i2 (1 i M), adds it to ϕ i1 d 1, and then sends ϕ i1 d 1 +ϕ i2 d 2 as one data packet to s 3. Finally, s L does the similar multiplication 1066
6 and addition and sends the result L j=1 ϕ ijd j (1 i M) to s 0. After s 0 receives all the M packets, s 0 can restore the original packets based on the compressive sampling theory [3]. The number of the transmitted packets is O(n 2 ) in Figure 3 (a) and is O(nM) in Figure 3 (b), and usually M n for large scale SNs. Therefore, CDG reduces the number of the transmitted packets. (a) (b) Fig. 3. Comparing of (a) basic data collection and (b) CDG [3]. B. Pipeline Scheduling Thanks to the benefit brought by CDG, we can address the continuous data collection problem with the pipeline technique. From the building process of the routing tree T, we know that the nodes in T can be divided into sets by levels D e, D L, C L 1, D L 1, C L 2,..., D 1, C 0, D 0 = {s 0 } in a bottom-up way, where D e is the set of all the dominatees, D i (0 i L ) is the set of the dominators at the i-th level, and C i (0 i L 1) is the set of the connectors at the i-th level. Since every node has two radios, one radio can be dedicated to receive data and the other is dedicated to transmit data. Therefore, the nodes at every level can receive and transmit data simultaneously over different channels. Consequently, for a continuous data collection task consisting of N snapshots, we propose a pipeline scheduling algorithm as follows. Step 1: All the nodes in D e transmit the packets of the j-th (1 j N 1) snapshot to their parent nodes in the CDG way, i.e. for every node s D e, s multiplies its data with M random coefficients respectively, and sends the M products to its parent node. After all the packets of the j-th snapshot have been transmitted successfully, the nodes in D e immediately transmit the packets of the (j + 1)-th snapshot in the CDG way. Step 2: After all the nodes in D l (1 l L ) receive all the packets of the j-th snapshot from their child-level, they send the packets of the j-th snapshot to their parent nodes in the CDG way, i.e. every node s D l combines its packet of the j-th snapshot with the received packets of the j-th snapshot, and sends the M new packets to its parent node. After all the packets of the j-th snapshot have been transmitted successfully, the nodes in D l immediately transmit the packets of the (j + 1)-th snapshot to their parent nodes in the CDG way, if they have received all the packets of the (j + 1)-th snapshot from their child-level. Step 3: After all the nodes in C l (0 l L 1) receive all the packets of the j-th snapshot from their child-level, they send the packets of the j-th snapshot to their parent nodes in the CDG way, i.e. every node s C l combines its packet of the j-th snapshot with the received packets of the j-th snapshot, and sends the M new packets to its parent node. After all the packets of the j-th snapshot have been transmitted successfully, the nodes in C l immediately transmit the packets of the (j+1)-th snapshot in the CDG way if they have received all the packets of the (j +1)-th snapshot from their child-level. Step 4: The sink restores the data of a snapshot in the CDG way after it receives all the packets of this snapshot. Steps 1-4 provide the general frame of our pipeline scheduling scheme. Now, we discuss how to prevent radio confliction and channel interference in Steps 1-3. If two or more nodes have the same parent node, we call them sibling nodes. In Steps 1-3, radio confliction may arise if two or more sibling nodes send data to their parent node simultaneously even over different orthogonal channels. This is because every sensor only has one radio dedicated to receiving data. Suppose that there are at most e (resp., d and c ) nodes in D e (resp., D l (1 l L ) and C l (1 l L 1)) which have the same parent node. Usually, e < (T ) except in onehop SNs, where any sensor is just one hop away from the sink, e = (T ). Then, d 4 and c 11 (Note that C 0 12.) (see Section III-B). To avoid confliction, we divide the nodes in D e (resp., D l and C l ) into e (resp., d and c ) subsets to guarantee that each node belongs to one subset and no sibling nodes belong to the same subset. Then, when we schedule the nodes of each level, we schedule these subsets in a certain order. For the nodes in C 0, we schedule them in a certain order. Different from the multi-path scheduling algorithm, in which a sensor sends one packet over a link in one time slot, we employ CDG, where a sensor sends M packets for a snapshot. e now introduce the concept of a Super Time Slot (STS) which consists of M time slots. In a STS, a sensor can send M packets over a channel for a snapshot. For the links working simultaneously, we assign channels and STSs in the similar way of the multi-path scheduling algorithm. C. Capacity Analysis In this subsection, we analyze the achievable network capacity of the proposed pipeline scheduling algorithm. Lemma 6 indicates the inductivity (Section III-C) of the corresponding conflicting graph of the links scheduled simultaneously in the pipeline scheduling algorithm. Lemma 6: Suppose that A is the set of the links in T scheduled simultaneously in the pipeline scheduling algorithm, and R(A) is the corresponding conflicting graph of A, then, δ (R(A)) 2β ρ+2 1, where δ (R(A)) is the inductivity of R(A). Proof: Please refer to [21]. Based on the result of Lemma 6, we can determine the number of the STSs used to schedule all the links in A as follows. 1067
7 Lemma 7: For the links of set A in Lemma 6, we can use STSs to schedule them without channel interference. Proof: Please refer to [21] of this paper. From the pipeline scheduling algorithm we know that the transport of subsequent snapshots has some time overlap with the transport of preceding snapshots. Therefore, we first analyze the time used to collect the packets of the first snapshot since it is the base of the pipeline, and then analyze the achievable capacity of the entire pipeline. Theorem 2: The number of the time slots used to collect the packets of the first snapshot by the pipeline scheduling algorithm is at most M ( e + 15L + 1). Proof: In Step 1 of the pipeline scheduling algorithm, we divide the nodes in D e into e subsets and schedule them in a certain order. By Lemma 7, each scheduling uses at most STSs. Consequently, Step 1 needs at most e STSs to finish the scheduling for the first snapshot. Similarly, Step 2 (resp., Step 3) needs at most 4L (resp., 11(L 1) ) STSs to finish the scheduling for the first snapshot. Furthermore, it needs at most 12 STSs for C 0 to transmit the packets for the first snapshot to the sink. In summary, the total number of the STSs used for the first snapshot is at most e + 4L + 11(L 1) +12 = ( e + 15L + 1). Since every STS has M time slots, then the number of the time slots usedfor the collection of the first snapshot is at most M ( e + 15L + 1). On the basis of the result in Theorem 2, we obtain the number of the time slots used to collect all the packets of N continuous snapshots for the pipeline scheduling algorithm as shown in Theorem 3. Theorem 3: The time slots used for the pipeline scheduling algorithm to collect N continuous snapshots are at most M ( e + 15L + 12N 11) when e 12 or M (N e + 15L + 1) when e > 12. Proof: From the proof of Theorem 2 we know, it takes the nodes in D e (resp., D l (1 l L ), C l (1 l L 1) and C 0 ) at most e (resp., 4, 11 and 12 ) STSs to transmit packets for a snapshot. In order to obtain the upper bound of the number of the time slots used, we assume the STSs used by nodes in D e (resp., D l (1 l L ), C l (1 l L 1) and C 0 ) are e (resp., 4, 11 and 12 ) in the following proof. Then, we prove Theorem 3 by cases. Case 1: e 4. For clearness, we use the transmission of two snapshots S-1 and S-2 shown in Figure 4(a) as an example for explanation. In Figure 4(a), the vertical axis denotes the levels in the routing tree T and the horizontal axisdenotes time slots. t e = e, t d = 4, t c = 11, and t 0 = 12. From Figure 4(a) we know, the nodes at D e - level begin to send packets of S-2 immediately after they send out the packets of S-1. Since e 4, after the nodes at D L - level receive all the packets of S-2, they may still be busy with the transmission of packets of S-1. Nevertheless, from the C L 1-level to the D 1 -level, the pipeline can be utilized in a maximum degree, which means whatever the packets of S-1 or the packets of S-2, they can be sent immediately. After the packets of S-2 are sent from the nodes at D 0 -level to the nodes in C 0, they may have to wait for a while at the nodes of the C 0 -level, since the transmission for the packets of S-1 may last for as long as 12 STSs. This implies the sink will receive all the packets of S-2 in 12 STSs after it receives all the packets of S-1. According to the description of the pipeline scheduling algorithm, the subsequent snapshots will be transmitted in the same way, which means the sink will receive all the packets of a snapshot at most every 12 STSs after it receives the packets of the first snapshot which takes at most M ( e + 15L + 1) time slots by Theorem 2. As a result, the number of time slots used to collect the packets of N continuous snapshots by the pipeline scheduling algorithm is at most M = M = M ( e + 15L + 1) + (N 1) 12M ( e + 15L N 12) ( e + 15L + 12N 11). Case 2: 4 < e 11 and Case 3: e = 12. These two cases can be proved by the similar method used in Case 1. The number of the time slots used to collect the packets of N continuous snapshots is also at most M ( e +15L + 12N 11). Case 4: e > 12. e use the data transmission of two snapshots shown in Figure 4(b) as an example to show the proof process. Since e > 12, the pipeline can be utilized in a maximum degree at D L -level and continue to C 0 -level. Then, the sink can receive all the packets of a subsequent snapshot every e STSs after it receives the packets of the first snapshot. Therefore, the number of the time slots used to collect the packets of N continuous snapshots is at most M = M = M ( e + 15L + 1) + (N 1) e M ( e + 15L (N 1) e ) (N e + 15L + 1). As a conclusion, Theorem 3 is true. Theorem 3 shows the number of the time slots used to collect N continuous snapshots. This prepares us to derive the achievable capacity of the pipeline scheduling algorithm. 1068
8 Levels Levels t e t d t e t d t c S-1 t 0 S t c (a) S-1 t 0 S (b) Time Slots Fig. 4. Data transport in (a) Case 1 and (b) Case 4. Time Slots Theorem 4: For a long-run continuous data collection, the lower bound of the achievable asymptotic network capacity of the pipeline scheduling algorithm is when e 12 or when M e( 3.63 e > 12. Proof: e prove Theorem 4 in two cases. Case 1: e 12. In this case the number of the time slots used to collect N continuous snapshots is at most M ( e + 15L + 12N 11) as proved in Theorem 3. Therefore, the lower bound of the capacity of the pipeline scheduling algorithm is N nb tm ( e+15l +12N 11) nb = tm ( e N + 15L 11 N +12 N ) = M ( e N + 15L 11 N +12 ). N hen N, the above equation approaches to, which means the asymptotic 12M network capacity in this case is. Case 2: e > 12. The asymptotic network capacity in this case is, which can be proved by the similar M e ( 3.63 method as in Case 1. In a dual-radio multi-channel SN, since every node has two radios, the upper bound of the network capacity is 2. This is because the sink can receive at most two packets in one time slot. From Theorem 4, it is possible for both and to be greater than 2. M e ( 3.63 There are two main reasons for this result. The most important one is the pipeline scheduling, which accelerates the data collection process directly and significantly, and as a result the network capacity is increased obviously. Another reason is the use of the CDG method. As indicated in [3], CDG reduces the total number of transmission times of packets in some degree. These two reasons are also validated by the simulation results in Section VI. Furthermore, we find that the pipeline scheduling algorithm is more effective for large scale SNs, since large scale SNs are more suitable for pipeline. The pipeline scheduling algorithm is also more effective for a long time of continuous data collection, which can also be seen from Theorem 4. VI. SIMULATIONS AND RESULT ANALYSIS e conducted simulations to verify the performances of the proposed algorithms through implementing them with the C language. For all the simulations, we assume every SN has one sink, and all the sensor nodes of each SN are randomly distributed in a square area and the communication radius of each node is normalized to one. Suppose the network MAC layer works with TDMA, i.e. the network time can be slotted. Every node produces one data packet in a snapshot and the size of a packet is normalized to one. Every available channel has the same bandwidth normalized to one. For any two different channels, we suppose they are orthogonal, i.e. the communications initialized over any two channels have no wireless interference. Furthermore, we assume a packet can be transmitted over a channel within a time slot. The compared algorithms are BFS [5], SLR [17] and CDG [3]. BFS is a snapshot data collection algorithm based on a breadth first search tree and scheduling is carried out path by path. BFS is specifically proposed for single-radio single-channel SNs. SLR is a straight-line routing method for multi-unicast communication in multi-channel wireless networks. e extend BFS and SLR to the general dual-radio multi-channel scenario in our simulations for fairness. The proposed multi-path scheduling algorithm is referred to as MPS and the pipeline scheduling algorithm is referred to as PS. In the remainder of this section, AR refers to the square area where a SN is deployed. ρ, n,, M, and N have the same meanings as mentioned before, respectively. A. Performance of MPS The snapshot data collection capacities of MPS, BFS, and SLR are shown in Figure 5. In Figure 5(a), the capacity of every algorithm increases when the number of the available channels increases, since more available channels enable more concurrent transmissions. MPS achieves a higher capacity compared with BFS and SLR. This is because MPS simultaneously schedules all the paths without radio confliction (except at the sink). hereas, BFS just schedules links without radio confliction on one path every time and SLR schedules all the transmission links simultaneously, which leads to serious radio confliction. On average, MPS achieves 77.49% and 41.95% more capacity than BFS and SLR, respectively. The effect of interference radius on capacity is shown in Figure 5(b). ith the increase of interference radius, more transmission interference occurs, which leads to the decrease of the capacities of all the algorithms. Nevertheless, MPS still achieves the largest capacity since it simultaneously schedules multiple paths without radio confliction, which suggests a nice tradeoff between BFS and SLR. On average, MPS achieves 67.45% and 37.37% more capacity than BFS and SLR, respectively. B. Performance of PS Since CDG, BFS, and SLR do not consider pipeline, they collect data snapshot by snapshot in continuous data collection. The continuous data collection capacities of PS, CDG, BFS, 1069
9 Capacity MPS BFS SLR (a) Capacity vs. (ρ=2) Capacity MPS BFS SLR (b) Capacity vs. ρ (=3) Fig. 5. Snapshot Data Collection Capacity (n = 4000, AR = 30 30). and SLR in different network scenarios are shown in Figure 6. Figure 6(a) reflects the effect of the number of the available channels on capacity. As explained before, the capacities of all the algorithms increase as more and more channels are available. PS has a much higher capacity compared with the other three algorithms. This is because: first and the most important, PS utilizes the pipeline technology; second, for the data of a single snapshot, PS collects them in the CDG way, which reduces the overall data transmission times. This also explains why CDG has a higher capacity compared with BFS and CDG. On average, PS achieves a capacity of 8.22 times of that of CDG, times of that of BFS and times of that of SLR, respectively. The effect of interference radius on capacity is shown in Figure 6(b). ith the increase of interference radius, a transmission link will interfere with more and more other transmission links, which leads to the decrease of capacity whatever algorithm it is. PS has the highest capacity among all the algorithms since it works with pipeline and CDG. On average, PS achieves a capacity of 7.31 times of that of CDG, times of that of BFS and times of that of SLR, respectively. Capacity PS CDG BFS SLR (a) Capacity vs. (ρ=2) Capacity (b) Capacity vs. ρ (=3) Fig. 6. Continuous Data Collection Capacity in Different Scenarios (n=10000, AR=50 50, N=1000, M=100). VII. CONCLUSION Motivated by the fact that there exist no works studying the capacity of continuous data collection, we investigate this problem in dual-radio multi-channel SNs. e first propose a multi-path scheduling algorithm for the snapshot data collection problem and prove that its achievable network capacity is at least 3.63 ρ2 +o(ρ) PS CDG BFS SLR. For the continuous data collection problem, although the authors in [5] claim that it can be solved by combining the pipeline technology with the existing works, we however find that pipeline with the existing works cannot actually improve the network capacity. e explain the reason of this, and then propose a novel continuous data collection method for dual-radio multi-channel SNs. This method speeds up the data collection process significantly. Theoretical analysis of this method shows that the achievable asymptotic network capacity is when e 12, or when M e ( 3.63 e > 12. The simulation results indicate that the proposed algorithms improve network capacity significantly compared with the existing works. ACKNOLEDGEMENT This work is partly supported by the NSF under grant No. CCF , and NSF China under grant No and REFERENCES [1] P.-J. an, S. C.-. uang, L. ang, Z. an and X. Jia, Minimum- Latency Aggregation Scheduling in Multihop ireless Networks, Mobihoc 2009, [2] C. Joo, J. Choi, and N. B. Shroff, Delay Performance of Scheduling with Data Aggregation in ireless Sensor Networks, Infocom [3] C. Luo, F. u, J. Sun, and C.. Chen, Compressive Data Gathering for Large-Scale ireless Sensor Networks, MobiCom [4] X. Zhu, B. Tang, and. Gupta, Delay Efficient Data Gathering in Sensor Networks, MSN [5] S. Chen, S. Tang, M. uang, and Y. ang, Capacity of Data Collection in Arbitrary ireless Sensor Networks, Infocom [6]. Cheng, X. Chen, T. Znati, X. Lu and Z. Lu, The Complexity of Channel Scheduling in Multi-Radio Multi-Channel ireless Networks, Infocom [7] P. Kyasanur and N.. Vaidya, Capacity of Multi-Channel ireless Networks: Impact of number of channels and interfaces, Mobicom 2005, [8] P. Gupta and P. R. Kumar, The Capacity of ireless networks, IEEE Trans. Inform. Theo., [9] C. Chau, M. Chen and S. C. Liew, Capacity of Large-Scale CSMA wireless Networks, Mobicom [10] O. Goussevskaia, R. attenhofer, M. M. alldorsson and E. elzl, Capacity of Arbitrary ireless Networks, Infocom [11] X.-Y. Li, S.-J. Tang and O. Frieder, Multicast Capacity for Large Scale ireless Ad oc Networks, Mobicom [12] S. Li, Y. Liu and X.-Y. Li, Capacity of Large Scale ireless Networks Under Gaussian Channel Model, Mobicom [13] U. Niesen, P. Gupta and D. Shah, On Capacity Scaling in Arbitrary ireless Networks, IEEE Transactions on Information Theory, 55(9): , [14] Z. ang,. R. Sadjadpour and J. J. Garcia-Luna-Aceves, A Unifying Perspective on the Capacity of ireless Ad oc Networks, Infocom [15] Y. Xu and. ang, Scheduling Partition for order optimal capacity in large-scale wireless networks, Mobicom [16] M. Garetto, P. Giaccone and E. Leonardi, On the Capacity of Ad oc ireless Networks Under General Node Mobility, Infocom [17] V. Bhandari and N.. Vaidya, Connectivity and Capacity of Multi- Channel ireless Networks with Channel Switching Constraints, Infocom [18]. Dai, K. Ng, R. C.-. ong and M. u, On the Capacity of Multi- Channel ireless Networks Using Directional Antennas, Infocom [19] X.-Y. Li, J. Zhao, Y.. u, S. J. Tang, X.. Xu and X. F. Mao, Broadcast Capacity for ireless Ad oc Networks, MASS [20] D.. Matula and L. L. Beck, Smallest-Last Ordering and Clustering and Graph Coloring Algorithms, Journal of the Association of Computing Machinery, 30(3): , [21] S. Ji, Y. Li and X. Jia, Capacity of Dual-Radio Multi-Channel ireless Sensor Networks for Continuous Data Collection,
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationMinimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks
Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Peng-Jun Wan 1,ZhuWang 1,ZhiyuanWan 2,ScottC.-H.Huang 2,andHaiLiu 3 1 Illinois Institute of Technology,
More informationSnapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks
Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks Shouling Ji Department of Computer Science Georgia State University Atlanta, Georgia 30303, USA Email:
More informationLow-Latency Multi-Source Broadcast in Radio Networks
Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years
More informationCoding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.
Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18
More informationInterference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks
Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and
More informationCONVERGECAST, namely the collection of data from
1 Fast Data Collection in Tree-Based Wireless Sensor Networks Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi (USC CENG Technical Report No.: ) Abstract We investigate
More informationOn the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing
1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationHierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks
Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Min Kyung An Department of Computer Science Sam Houston State University Huntsville, Texas 77341, USA Email: an@shsu.edu
More informationRouting versus Network Coding in Erasure Networks with Broadcast and Interference Constraints
Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationMULTI-HOP wireless networks consist of nodes with a
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Minimum Latency Broadcast Scheduling in Duty-Cycled Multi-Hop Wireless Networks Xianlong Jiao, Student Member, IEEE, Wei Lou, Member, IEEE, Junchao
More informationEasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network
EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and
More informationDuty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks
2010 International Conference on Distributed Computing Systems Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks Xianlong Jiao,WeiLou, Junchao Ma, Jiannong Cao, Xiaodong
More informationMinimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks
Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.
More informationOpportunistic cooperation in wireless ad hoc networks with interference correlation
Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract
More informationSuperimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University
More informationMinimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks
Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Lixin Wang, Peng-Jun Wan, and Kyle Young Department of Mathematics, Sciences and Technology, Paine College, Augusta, GA 30901,
More informationScheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks
Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:
More informationMobility Tolerant Broadcast in Mobile Ad Hoc Networks
Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical
More informationAggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation
Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation Hongxing Li, Chuan Wu, Dongxiao Yu, Qiang-Sheng Hua and Francis C.M. Lau Department of Computer
More informationApproximation Algorithms for Interference Aware Broadcast in Wireless Networks
Approximation Algorithms for Interference Aware Broadcast in Wireless Networks Dianbo Zhao University of Wollongong Email: dz985@uowmail.edu.au Kwan-Wu Chin Univiversity of Wollongong Email: kwanwu@uow.edu.au
More informationRumors Across Radio, Wireless, and Telephone
Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu
More informationA Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model
A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationOn the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge
On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.
More informationThe Worst-Case Capacity of Wireless Sensor Networks
The Worst-Case Capacity of Wireless Sensor Networks Thomas Moscibroda Microsoft Research Redmond WA 98052 moscitho@microsoft.com ABSTRACT The key application scenario of wireless sensor networks is data
More informationOVSF-CDMA Code Assignment in Wireless Ad Hoc Networks
Algorithmica (2007) 49: 264 285 DOI 10.1007/s00453-007-9094-6 OVSF-CDMA Code Assignment in Wireless Ad Hoc Networks Peng-Jun Wan Xiang-Yang Li Ophir Frieder Received: 1 November 2004 / Accepted: 23 August
More informationRadio Aggregation Scheduling
Radio Aggregation Scheduling ALGOSENSORS 2015 Rajiv Gandhi, Magnús M. Halldórsson, Christian Konrad, Guy Kortsarz, Hoon Oh 18.09.2015 Aggregation Scheduling in Radio Networks Goal: Convergecast, all nodes
More informationOn the Performance of Cooperative Routing in Wireless Networks
1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationTime Efficient Data Aggregation Scheduling in Cognitive Radio Networks
Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks Mingyuan Yan, Shouling Ji,, and Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, Georgia 333, USA Email:
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationLoad- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls
Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls Michelle X. Gong, Shiwen Mao and Scott F. Midkiff Networking Technology Lab, Intel Corporation, Santa Clara, CA 9 Dept. of
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationProbabilistic Coverage in Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationTime-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks
1 Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks Guobao Sun, Student Member, IEEE, Fan Wu, Member, IEEE, Xiaofeng Gao, Member, IEEE, Guihai Chen, Member, IEEE, and Wei Wang,
More information3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011
3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla
More informationIN recent years, there has been great interest in the analysis
2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We
More informationA Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks
A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu
More informationEnergy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks
Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networs Siyuan Chen Minsu Huang Yang Li Ying Zhu Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,
More informationEnd-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference
End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern
More informationSensor Networks. Distributed Algorithms. Reloaded or Revolutions? Roger Wattenhofer
Roger Wattenhofer Distributed Algorithms Sensor Networks Reloaded or Revolutions? Today, we look much cuter! And we re usually carefully deployed Radio Power Processor Memory Sensors 2 Distributed (Network)
More informationIndex Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.
3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationSequential Multi-Channel Access Game in Distributed Cognitive Radio Networks
Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College
More informationMulti-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks
Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary
More informationCooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study
Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:
More informationInterference-Aware Broadcast Scheduling in Wireless Networks
Interference-Aware Broadcast Scheduling in Wireless Networks Gruia Calinescu 1,, Sutep Tongngam 2 Department of Computer Science, Illinois Institute of Technology, 10 W. 31st St., Chicago, IL 60616, U.S.A.
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationOn the Capacity Regions of Two-Way Diamond. Channels
On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of
More informationMedium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks
Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationUtilization-Aware Adaptive Back-Pressure Traffic Signal Control
Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationPhase Transition Phenomena in Wireless Ad Hoc Networks
Phase Transition Phenomena in Wireless Ad Hoc Networks Bhaskar Krishnamachari y, Stephen B. Wicker y, and Rámon Béjar x yschool of Electrical and Computer Engineering xintelligent Information Systems Institute,
More informationScaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous
More informationMultihop Routing in Ad Hoc Networks
Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline
More informationRevisiting Neighbor Discovery with Interferences Consideration
Author manuscript, published in "3rd ACM international workshop on Performance Evaluation of Wireless Ad hoc, Sensor and Ubiquitous Networks (PEWASUN ) () 7-1" DOI : 1.115/1131.1133 Revisiting Neighbor
More informationComputing functions over wireless networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/
More information2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationMaximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks
Maximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks Bechir Hamdaoui and Kang G. Shin Abstract We have recently witnessed a rapidly-increasing demand for, and hence a shortage
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,
More informationAnalysis of Bottleneck Delay and Throughput in Wireless Mesh Networks
Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Xiaobing Wu 1, Jiangchuan Liu 2, Guihai Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China wuxb@dislab.nju.edu.cn,
More informationarxiv: v1 [cs.it] 12 Jan 2011
On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom
More informationPerformance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies John Gibson * Geoffrey G.
In proceedings of GLOBECOM Ad Hoc and Sensor Networking Symposium, Washington DC, November 7 Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies John Gibson *
More informationMobility and Fading: Two Sides of the Same Coin
1 Mobility and Fading: Two Sides of the Same Coin Zhenhua Gong and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {zgong,mhaenggi}@nd.edu Abstract
More informationAn Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks
1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationBBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks
International Journal of Distributed Sensor Networks, : 3 54, 006 Copyright Taylor & Francis Group, LLC ISSN: 1550-139 print/1550-1477 online DOI: 10.1080/1550130500330711 BBS: An Energy Efficient Localized
More informationEfficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios
Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Roberto Hincapie, Li Zhang, Jian Tang, Guoliang Xue, Richard S. Wolff and Roberto Bustamante Abstract Cognitive radios allow
More informationTransmission Delay in Large Scale Ad Hoc Cognitive Radio Networksi
Transmission Delay in Large Scale Ad Hoc Cognitive Radio Networks 1 Transmission Delay in Large Scale Ad Hoc Cognitive Radio Networksi Zhuotao Liu 1, Xinbing Wang 1, Wentao Luan 1 and Songwu Lu 2 1 Department
More informationCooperative Routing in Wireless Networks
Cooperative Routing in Wireless Networks Amir Ehsan Khandani Jinane Abounadi Eytan Modiano Lizhong Zheng Laboratory for Information and Decision Systems Massachusetts Institute of Technology 77 Massachusetts
More informationarxiv: v1 [cs.ni] 30 Jan 2016
Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng
More informationDesign of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee
Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization
More informationAnalysis of k-hop Connectivity Probability in 2-D Wireless Networks with Infrastructure Support
Analysis of k-hop Connectivity Probability in 2-D Wireless Networks with Infrastructure Support Seh Chun Ng and Guoqiang Mao School of Electrical and Information Engineering, The University of Sydney,
More informationOptimal Transceiver Scheduling in WDM/TDM Networks. Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 8, AUGUST 2005 1479 Optimal Transceiver Scheduling in WDM/TDM Networks Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE
More informationChapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks
Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional
More informationBroadcast with Heterogeneous Node Capability
Broadcast with Heterogeneous Node Capability Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA. email: {kangit,radha}@ee.washington.edu Abstract
More informationTHE field of personal wireless communications is expanding
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,
More informationNoisy Index Coding with Quadrature Amplitude Modulation (QAM)
Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian
More informationImproved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks
Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial
More informationOn Achieving Local View Capacity Via Maximal Independent Graph Scheduling
On Achieving Local View Capacity Via Maximal Independent Graph Scheduling Vaneet Aggarwal, A. Salman Avestimehr and Ashutosh Sabharwal Abstract If we know more, we can achieve more. This adage also applies
More informationChannel Sensing Order in Multi-user Cognitive Radio Networks
2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering
More informationA Deterministic Approach to Throughput Scaling in Wireless Networks
A Deterministic Approach to Throughput Scaling in Wireless Networks Sanjeev R. Kulkarni and Pramod Viswanath 1 Nov, 2002 Abstract We address the problem of how throughput in a wireless network scales as
More informationAnalysis of Power Assignment in Radio Networks with Two Power Levels
Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two
More informationThe Complexity of Connectivity in Wireless Networks
The Complexity of Connectivity in Wireless Networks Thomas Moscibroda Computer Engineering and Networks Laboratory ETH Zurich, Switzerland moscitho@tik.ee.ethz.ch Roger Wattenhofer Computer Engineering
More informationLightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,
More informationRandomized Channel Access Reduces Network Local Delay
Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement
More informationUnderstanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks
Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2
More informationOptimum Power Allocation in Cooperative Networks
Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ
More informationS-GPBE: A Power-Efficient Broadcast Routing Algorithm Using Sectored Antenna
S-GPBE: A Power-Efficient Broadcast Routing Algorithm Using Sectored Antenna Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA. - email: {kangit,radha}@ee.washington.edu
More informationEnergy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks
2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks Lijie Xu, Jiannong Cao,
More informationJoint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks
Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Won-Yeol Lee and Ian F. Akyildiz Broadband Wireless Networking Laboratory School of Electrical and Computer
More informationBroadcasting in Conflict-Aware Multi-Channel Networks
Broadcasting in Conflict-Aware Multi-Channel Networks Francisco Claude 1, Reza Dorrigiv 2, Shahin Kamali 1, Alejandro López-Ortiz 1, Pawe l Pra lat 3, Jazmín Romero 1, Alejandro Salinger 1, and Diego Seco
More informationOn Coding for Cooperative Data Exchange
On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University
More information