Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection

Size: px
Start display at page:

Download "Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection"

Transcription

1 This paper was presented as part of the main technical program at IEEE INFOCOM 2011 Capacity of Dual-Radio Multi-Channel ireless Sensor Networks for Continuous Data Collection Shouling Ji Department of Computer Science Georgia State University Atlanta, Georgia 30303, USA Yingshu Li Department of Computer Science Georgia State University Atlanta, Georgia 30303, USA Xiaohua Jia Department of Computer Science City University of ong Kong Kowloon, ong Kong Abstract Data collection is an important operation of wireless sensor networks (SNs). The performance of data collection can be measured by its achievable network capacity. Most existing works focus on the capacity of unicast, multicast or snapshot data collection in single-radio single-channel wireless networks, and no dedicated works consider the continuous data collection capacity for SNs in detail under the protocol interference model. In this paper, we first propose a multi-path scheduling algorithm for the snapshot data collection in single-radio multi-channel SNs and prove that its achievable network capacity is at least, 3.63 ρ2 +o(ρ) which is a tighter lower bound compared with the previously best result in [5] which is, where is the bandwidth over a 8ρ 2 channel, is the number of the available orthogonal channels, ρ is the ratio of the interference radius over the transmission radius of a sensor and o(ρ) is a linear equation of ρ. For the continuous data collection problem, although the authors in [5] claim that data collection can be pipelined with existing works, we find that such an idea cannot actually improve network capacity. e explain the reason for this and propose a novel continuous data collection method for dual-radio multi-channel SNs. This method significantly speeds up the data collection process, and achieves a capacity of when e 12, or when M e ( 3.63 e > 12, where n is the number of sensors, M is a constant value and usually M n, and e is the maximum number of leaf nodes having a same parent node in the routing tree (i.e. data collection tree). The simulation results also indicate that the proposed algorithms significantly improve network capacity compared with the existing works. I. INTRODUCTION ireless Sensor Networks (SNs) are mainly used for collecting data from the physical world. Data gathering can be categorized as data aggregation [1], [2], which obtains aggregated values from SNs, and data collection [3]-[5], which gathers all the data from a network without any data aggregation. For data collection, the union of all the sensing values from all the sensors at a particular time instance is called a snapshot [5]. The problem of collecting one snapshot is called snapshot data collection. The problem of collecting multiple continuous snapshots is called continuous data collection. Different from wired networks, SNs suffer from the interference problem, which degrades the network performance. Consequently, network capacity, which can reflect the achievable data transmission rate, is usually used as an important measurement to evaluate network performance. Particularly, for a data collection SN, we use the data receiving rate at the sink, referred as data collection capacity, to measure its achievable network capacity, i.e. data collection capacity reflects how fast data been collected to the sink. After the first work [8], extensive works emerged to study the network capacity issue for variety of network scenarios, e.g. multicast capacity [11], [12], unicast capacity [13], broadcast capacity [19], snapshot data collection capacity [3]-[5] and etc. Most of the previous studies on network capacity are for single-radio single-channel SNs [3]-[5], [8]-[16], where a network consists of a number of nodes with only one radio each and all the nodes communicate over a common single channel. Because of the inherent limitations of such networks, transmissions suffer from the radio confliction problem [6], [7] and the channel interference problem [17], [18], [7] seriously. This degrades network performance significantly. The radio confliction problem is caused by the fact that each node is equipped with only one radio, which means a node can only work on a half-duplex mode, i.e. this node cannot receive and transmit data simultaneously. The channel interference problem is caused by all the nodes working over a common channel. hen one node transmits data, all the other nodes within its interference radius cannot receive any other data and all the other transmissions interfering with this transmission cannot be carried out simultaneously. Fortunately, many current offthe-shelf sensor nodes are capable of working over multiple orthogonal channels, e.g. IEEE b/g standard supports 3 orthogonal channels and IEEE a standard supports 13 orthogonal channels [6] respectively, which can greatly mitigate the channel interference problem. Furthermore, with the development of hardware technologies and the decreasing of hardware cost, a sensor node can be equipped with multiple radios. This helps with solving the radio confliction problem. Different from the previous works which investigate the capacity issues for single-radio single-channel SNs, we study the network capacity problem for both continuous data collection and snapshot data collection in dual-radio multi-channel SNs under the protocol interference model. Meanwhile, the results obtained in this paper can be extended to SNs under the physical interference model [19]. The motivation of this work lies in the fact that dual-radio multi-channel SNs can make nodes work in a full-duplex manner without incurring /11/$ IEEE 1062

2 high hardware cost, while the channel interference problem can be mitigated significantly. To the best of our knowledge, the previous works only address the snapshot data collection capacity problem, and our work is the first dedicated one investigating the continuous data collection capacity problem in detail under the protocol interference model. The main contributions of our work are as follows. For the snapshot data collection problem in singleradio multi-channel SNs, we propose a new multi-path scheduling algorithm. e prove that this algorithm can achieve the order-optimal network capacity Θ( ) and has a tighter lower bound 3.63 ρ2 +o(ρ) compared with the previously best result in [5], which is 8ρ, where is the 2 channel bandwidth, is the number of the orthogonal channels, ρ is the ratio of the interference radius over the transmission radius of a node, and o(ρ) is a linear equation of ρ. Currently, there are no dedicated solutions for the continuous data collection capacity problem in SNs. An intuitive method is to combine a snapshot data collection method with the pipeline technology [5]. owever, this idea does not work for most of the existing works. e explain the reasons for the failure of this idea and show that pipeline with the methods in [4] and [5] cannot improve network capacity. e propose a novel pipeline scheduling algorithm that combines Compressive Data Gathering (CDG) [3] and pipeline together, which significantly improves the continuous data collection capacity for dual-radio multichannel SNs. e also prove that the achievable asymptotic network capacity of this algorithm in a long-run is when e 12, or M e( 3.63 when e > 12, where n is the number of the sensors, M is a constant value and usually M n, and e is the maximum number of the leaf nodes having a same parent in the routing tree (i.e. data collection tree). A straightforward upper bound of a dual-radio SN is 2, since a dual-radio sink can simultaneously receive two packets at most. hereas, thanks to the benefit brought by the pipeline technique, the analysis shows that our pipeline scheduling algorithm can even achieve a capacity higher than 2. The simulation results indicate that the proposed algorithms have a better snapshot data collection capacity compared with the previously best works. The rest of this paper is organized as follows: Section II summarizes the related works. Section III introduces the network model and preliminaries. The multi-channel scheduling algorithm for snapshot data collection in single-radio multi-channel SNs is proposed and analyzed in Section IV. Section V presents a novel multi-channel scheduling algorithm for continuous data collection and its theoretical achievable asymptotic network capacity. The simulations to validate the performance of the proposed algorithms are shown in Section VI and we conclude this paper in Section VII. II. RELATED ORK A. Capacity for Single-Radio Single-Channel ireless Networks The works in [9], [10] focus more on the MAC layer to improve network capacity. In [9], the authors studied the capacity of CSMA wireless networks. They formulated the models of a series of CSMA protocols and study the capacity of CSMA scheduling versus TDMA scheduling. In [10], the authors considered the scheduling problem where all the communication requests are single-hop and all the nodes transmit at a fixed power level. They proposed an algorithm to maximize the number of links in one time-slot. The works in [11]-[14] study the multicast and/or unicast capacity of wireless networks. The multicast capacity for wireless ad hoc networks under the protocol interference model and the Gaussian channel model are investigated in [11] and [12] respectively. In [11], the authors showed that the network multicast capacity is Θ( n log n n k ) when k = O( log n ) and is Θ( ) when k = Ω( n log n ). In [12], the authors showed n that when k θ 1 and n s θ 2 n 1/2+β, the capacity (log n) 2α+6 that each multicast session can achieve is at least c 8 n s k. Considering the problem of characterizing the unicast capacity scaling in arbitrary wireless networks, the authors proposed a general cooperative communication scheme in [13]. A more general casting capacity problem was investigated in [14] for random wireless networks. The snapshot data collection capacity of SNs is studied in [4], [5], and [3]. In [4], the authors considered the collisionfree delay-efficient data gathering problem. They proposed a family of path scheduling algorithms. The authors of [5] extended the work of [4]. They derived tighter upper and lower bounds of the capacity of snapshot data collection for arbitrary SNs. The work in [3] studies how to distribute a data collection task to the entire network to achieve load balancing. In this work, all the sensors transmit the same number of data packets during the data collection process. In [15], a method which decomposes a large network into many small zones is proposed, and then localized scheduling algorithms which can achieve the order optimal capacity are executed in each zone independently. A general framework to characterize the capacity of wireless ad hoc networks with arbitrary mobility patterns is studied in [16]. B. Capacity for Multi-Channel ireless Networks Since wireless nodes can work over multiple orthogonal channels, the issue of the capacity of multi-channel wireless networks also attracts a lot of attention [17], [18], and [7]. In [17], the authors studied the connectivity and capacity problem of multi-channel wireless networks. They considered a multichannel wireless network under the constraints on channel switching, proposed some routing and channel assignment strategies for multiple unicast communications and derived the per-flow capacity. In [18], the authors first proposed a multi-channel network architecture, called MC-MDA, and then obtained the capacity of multiple unicast communications n 1063

3 under arbitrary and random network models. The impact of the number of the channels, the number of the interfaces and the interface switching delay on the capacity of multi-channel wireless networks is investigated in [7]. In this work, the authors derived the network capacity under different situations for arbitrary and random networks. C. Remarks Unlike the above mentioned works, our work has the following two main characteristics. First, most of the above mentioned works are specifically for single-radio single-channel wireless networks, while our work considers dual-radio multichannel SNs. Second, to the best of our knowledge, our work is the first dedicated one that investigates network capacity for continuous data collection in detail under the protocol interference model, whereas most of the previous works study network capacity for multicast or/and unicast and etc. For the works that study the data collection capacity of wireless networks, they only consider snapshot data collection which is just a special case of continuous data collection. III. NETORK MODEL AND PRELIMINARIES A. Network Model e consider a SN consisting of n sensors and one sink, represented by a connected undirected graph G = (V, E), where V is the set of all the nodes in the network and E is the set of all the possible links among the nodes in V. Every sensor in the SN produces one packet in a snapshot. Each sensor has two radios and each radio has a fixed transmission radius normalized to one and a fixed interference radius, denoted by ρ, ρ 1. Since we use the protocol interference model, for any receiving node v, v can successfully receive a packet from a transmitting node u if u v 1 and there is no other node s satisfying s v ρ and trying to transmit a packet simultaneously over the same channel with u. ere is the Euclidean distance. Furthermore, we say two links are interference links if at least one transmission over them will fail if they transmit data simultaneously over a common channel. Each radio can work over orthogonal channels, denoted by λ 1, λ 2,..., λ respectively. A fixed data-rate channel model [5] is adopted in this paper, which means each sensor can transmit at a rate of bits/second over a wireless channel. The size of all the packets transmitted in the network is set to be b bits. e also assume that all the transmissions are synchronized and the size of a time slot is t = b/ seconds. e further give the formal definition of the capacity of data collection. The capacity Υ of data collection is the ratio between the size of the data successfully received by the sink and the time τ used to collect these data, e.g. in a SN consisting of n sensors, the capacity to collect N snapshots of data is Υ = Nnb τ, which is actually the data rate at the sink. B. Routing Tree G is a unit-disk graph representing a SN. e define the sink s 0 as the center of G. The radius of G with respect to s 0 is the maximum depth of the Breadth-First-Search (BFS) tree rooted at s 0. For a subset U of V, U is a Dominating Set (DS) of G if every node in V is either an element of U or adjacent to at least one node in U. If the subgraph of G induced by U is connected, then U is called a Connected Dominating Set (CDS) of G. e build a CDS based on routing tree T using the method proposed in [1]. T is rooted at the sink and can be built according to the following steps. First, obtain a Maximal Independent Set (MIS) D according to the BFS search sequence. Note that D is also a DS of G and an element in D is called a dominator. Let G be a graph on D in which two nodes in D are linked by an edge if and only if these two nodes have a common neighbor in G. Obviously, sink s 0 is in G. Suppose that the radius of G with respect to s 0 is L and we denote the union of dominators at level l(0 l L ) as set D l. Second, we choose nodes, also called connectors, to connect all the nodes in D to form a CDS. Let S l (0 l L ) be the set of the nodes adjacent to at least one node in D l and at least one node in D l+1 and compute a minimal cover C l S l for D l+1. Let C = L 1 0 C l and therefore D C is a CDS of G. Finally, for any other node u, also called a dominatee, not belonging to D C, choose the nearest dominator as u s parent node. Thus, the routing tree T is obtained. For each link in T, the receiving (resp., transmitting) node, i.e. parent (resp., child) node, of this link is called a head (resp., tail). Suppose that A is a set of links of T. The corresponding conflicting graph of A is denoted by R(A) = (V A, E A ), where each link in A is abstracted to a node in V A and two nodes in V A form an edge in E A if the corresponding two links of these two nodes are interference links. Lemma 1 in [1] can be used to derive some useful results of the routing tree T. Lemma 1: [1] Suppose that O is a half-disk with radius r, and U is a set of points with mutual distances of at least one. Then the number of the points β r in a half-disk is β r = U O π 3 r 2 + ( π 2 + 1)r + 1. From Lemma 1, the authors in [1] derived the following properties of the routing tree T. First, for each 0 l L 1, each connector in C l is adjacent to at most 4 dominators in D l+1. Second, for each 1 l L 1, each dominator in D l is adjacent to at most 11 connectors in C l. Third, C C. Vertex Coloring Problem For a graph G = (V, E), the maximum degree (minimum degree) of G is denoted by (G) (δ(g)). A subgraph of G on U V is denoted by G(U). The inductivity of G is defined as δ (G) = max δ(g(u)). A vertex coloring of G is a scheme of U V coloring all the vertices in G such that no two adjacent vertices share the same color. The chromatic number χ(g) of G is the least number of colors used to color G. Deciding the lower bound of χ(g) is a well-known NPC problem. owever, the upper bound of χ(g) has been derived in graph theory [20], [1]. The following lemma was proved in [20] and [1]. Lemma 2: χ(g) 1+δ (G) and a vertex coloring scheme, called first-fit coloring, for G using at most 1 + δ (G) colors 1064

4 can be found in polynomial time. Given a link set A of T, the channel assignment problem for A can be abstracted to the vertex coloring problem for its corresponding conflicting graph R(A). If the tail (resp., head) of every link in A is a dominator, then Lemma 3 in [1] gives the upper bound of δ (A). Lemma 3: [1] δ (A) β ρ+1 1. Lemma 3 implies that in the worst case, at most β ρ+1 channels may be assigned to all the links in A without channel interference by a first-fit coloring method. Fig s 0 1 s 1 0 s 0 1 s 1 1rd 1 s 0 0 s 1 2rd 1 s 0 1 s 1 3rd 2 s 0 0 s 1 4rd 2 s 0 1 s 1 5rd 3 s 0 0 s 1 1 s 2 1 s 3 1 s 2 1 s 3 2 s 2 1 s 2 1 s 2 0 s 2 0 s 2 (a) (b) (a) A single path and (b) its scheduling (rd = round). IV. CAPACITY OF SNAPSOT DATA COLLECTION In this section, we first investigate the traditional snapshot data collection problem, and propose a novel scheduling algorithm with a tighter lower capacity bound for this problem in single-radio multi-channel SNs. Subsequently, we discuss the proposed algorithm further, and point out that the proposed algorithm and most existing works cannot improve network capacity with the pipeline technology. Since at any time slot, the sink can receive data from at most one sensor, the upper bound of the snapshot data collection capacity is [5]. Aiming at this upper bound, we design a scheduling algorithm for snapshot data collection which is order-optimal and has a tighter lower bound than the previously best result [5]. A. Scheduling Algorithm for Snapshot Data Collection In this subsection, we design a new multi-path scheduling algorithm based on the routing tree T built in Section III, which is proven to have a better performance. e first study how to schedule a single path and then extend it to the scheduling of multi-path in T. For simplicity, we introduce the concept of round. A round is a period of time consisting of multiple continuous time slots. e take the path shown in Figure 1(a) as an example to explain the idea of the single path scheduling scheme. In Figure 1(a), the path, denoted by P, consists of one sink s 0 and three sensors s 1, s 2, and s 3, where s 0 and s 2 are dominators, s 1 is a connector, and s 3 is a dominatee. The value marked in each node is the number of the packets at this node to be transmitted. Initially, every sensor on P has one packet and there is no packet at s 0. P o (resp., P e ) denotes the set of links on P whose heads (resp., tails) are dominators and whose tails have at least one packet to be transmitted. e schedule P according to the following two steps and repeat them until all the packets have been collected by s 0. Step 1: In an odd round, schedule every link in P o once, i.e. assign a dedicated channel and one dedicated time slot to each link in P o. Step 2: In an even round, schedule every link in P e once, i.e. assign a dedicated channel and one dedicated time slot to each link in P e. The detailed scheduling in Step 1 can be done in the following way: first, calculate the interference degree i.e. the number of the links interfering with another link, for each link in P o ; second, sort the links in P o according to their interference degrees in a non-decreasing order and denote the resulting link sequence as {l 1, l 2,..., l Po }; finally, during the i-th (1 i ) time slot of a round, let the j- Po th ((i 1) < j i) link in P o work on channel λ j%+1. The detailed scheduling in Step 2 is similar to that of Step 1. The scheduling process of P is shown in Figure 1(b). During the first (odd) round, links (s 3, s 2 ) and (s 1, s 0 ) are scheduled and the packets in s 3 and s 1 are transmitted to their parent nodes. After the first round, s 3 has no packet to transmit. During the second (even) schedule, link (s 2, s 1 ) is scheduled and s 2 transmits one packet to its parent node. This schedule process continues until all the packets on path P has been transmitted to s 0. e now consider the scheduling of the routing tree T built in Section III. Suppose that there are m leaf nodes in T, and the path from leaf node s i (1 i m) to the sink s 0 is denoted by P i. Two paths P i and P j are said intersecting if they have at least one common node besides the sink node. The common node of two intersected paths having the largest number of hops from the sink is called an intersecting point. If path P i intersects with other paths, the route from s i to the nearest intersecting point of s i is called a sub-path, denoted by F i. Otherwise, F i is actually P i. The basic idea of our multi-path scheduling algorithm is as follows: For the non-intersecting paths without wireless interference, schedule them by the single path scheduling algorithm concurrently. For the non-intersecting paths with wireless interference, schedule them according to a certain order. The path with the smallest subscript has the highest priority. For the intersecting paths, schedule them according to a certain order, e.g. if P i is the one of these intersecting paths with the smallest subscript, schedule P i until there is no packet having to be transmitted on the sub-path F i and then continue to schedule the next path. e further explain the multi-path scheduling algorithm by the routing tree shown in Figure 2(a). In Figure 2(a), there are three leaf nodes s 1, s 2, and s 3 and their corresponding paths are P 1, P 2 and P 3, respectively. Path P 1 and path P 3 are not intersecting, therefore they are scheduled concurrently. Since path P 1 and path P 2 are intersecting paths, path P 1 is scheduled first. After no packets on the sub-path F 1 of P 1 have to be transmitted, path P 2 is scheduled as shown in Figure 2(b). 1065

5 Fig. 2. F 1 s 1,P 1 s 0 (sink) s 2,P 2 (a) B. Capacity Analysis s 3,P 3 F 1 s 1,P 1 s 0 (sink) s 2,P 2 s 3,P 3 (b) s 0 (sink) s 2,P 2 (a) A routing tree and (b) its scheduling. The upper bound of the snapshot data collection capacity is which has been explained. Consequently, we focus on the lower bound of the snapshot data collection capacity. In the worst case, all the paths in the routing tree T are intersecting, which means only one path can be scheduled at any time. In order to derive the lower bound of the multi-path scheduling algorithm, we first investigate the number of the rounds needed to finish the scheduling of one single path and then study the number of the time slots in each round. Lemma 4 gives the maximum number of the rounds used for scheduling of one single path. Lemma 4: For a path P of length L, it takes at most 2L 1 rounds to collect all the packets on P at the sink node. Proof: Please refer to [21] of this paper. From Lemma 4, it is straightforward to obtain the number of the rounds used to collect all the data on the sub-path F of P as shown in Corollary 1. Note that the intersecting point also needs one round to transmit its packet. Corollary 1: For the sub-path F of length L s in P, it takes at most 2L s rounds to collect all the packets on F. The maximum number of the time slots in a round is as follows. Lemma 5: A round has at most time slots. Proof: During every odd (resp., even) round, the scheduled links are links in P o (resp., P e ). Since the heads (resp., tails) of links in P o (resp., P e ) are dominators, we can schedule all the links in P o (resp., P e ) in one time slot with at most β ρ+1 channels by Lemma 3 and Lemma 2. Now, we have available channels, which means we can finish the scheduling ρ2 +o(ρ) within time slots. Therefore, the lemma holds. Now we can obtain the lower bound of the achievable capacity of the multi-path scheduling algorithm as shown in Theorem 1. Theorem 1: The capacity Υ at the sink of T of the multipath scheduling algorithm is at least 3.63, which is order-optimal. Proof: Suppose that T has m paths and the length of each path is L i (1 i m). In the worst case, all the m paths cannot be scheduled concurrently. Then by Lemma 4, Corollary 1 and Lemma 5, the total time τ used to collect 2L i i=1 According to the multi-path scheduling algorithm, for any path all the packets of T at the sink is at most t m. P i, the time used to collect packets on P i is equal to the time used to collect packets on the corresponding sub-path F i of P i. Therefore, τ t m m 2L i = 2t F i. i=1 i=1 Since the number of the links in T is equal to the number of the sensors in T, m F i = n. Then, τ 2nt i=1 Therefore, the capacity Υ = nb 3.63 ρ2 +o(ρ) nb τ = 2nt. 2, where o(ρ) is a linear equation of ρ. Since the upper bound of Υ is, Υ is order-optimal. From Theorem 1, the multi-path scheduling algorithm has a tighter lower bond compared with the previously best result in [5], which has a lower bound of 8ρ. 2 C. Discussion hen we address the continuous data collection problem, an intuitive idea is to pipeline the existing snapshot data collection operations [5]. Nevertheless, such an idea cannot achieve a better performance. This is because the sink can receive at most one packet in a time slot. By pipeline, data transmissions at the nodes far from the sink are really accelerated. owever, the fact that a sink can receive at most one packet in each time slot makes the data accumulated at the nodes near the sink. Finally, the network capacity cannot be improved even with pipeline. This motivates us to investigate new methods for continuous data collection. V. CAPACITY OF CONTINUOUS DATA COLLECTION e propose a novel pipeline scheduling algorithm based on compressive data gathering (CDG) [3] for dual-radio multichannel SNs in this section, which augments the continuous data collection capacity significantly. ere we consider dualradio multi-channel SNs because dual radios can make a half-duplex single-radio node work in a full-duplex mode. Note that our pipeline scheduling algorithm can also be used in the single-radio scenario just with a little modification. A. Compressive Data Gathering (CDG) CDG is first proposed in [3] for snapshot data gathering in single-radio single-channel SNs. The basic idea of CDG is to distribute the data collection load uniformly to all the nodes in the entire network. e take the data collection on a path consisting of L sensors s 1, s 2,..., s L and one sink s 0 as shown in Figure 3 [3] as an example to explain CDG. In Figure 3, the packet produced at sensor s j (1 j L) is d j. In the basic data collection shown in Figure 3(a), s 1 transmits one packet d 1 to s 2, s 2 transmits two packets d 1 and d 2 to s 3, and finally all the packets on the path are transmitted to s 0 by s L. To balance the transmission load, the authors in [3] proposed the CDG method as shown in Figure 3(b). Instead of transmitting the original data directly, s 1 multiplies its data with a random coefficient ϕ i1 (1 i M), and sends the M results ϕ i1 d 1 to s 2. Upon receiving ϕ i1 d 1 (1 i M) from s 1, s 2 multiplies its data d 2 with a random coefficient ϕ i2 (1 i M), adds it to ϕ i1 d 1, and then sends ϕ i1 d 1 +ϕ i2 d 2 as one data packet to s 3. Finally, s L does the similar multiplication 1066

6 and addition and sends the result L j=1 ϕ ijd j (1 i M) to s 0. After s 0 receives all the M packets, s 0 can restore the original packets based on the compressive sampling theory [3]. The number of the transmitted packets is O(n 2 ) in Figure 3 (a) and is O(nM) in Figure 3 (b), and usually M n for large scale SNs. Therefore, CDG reduces the number of the transmitted packets. (a) (b) Fig. 3. Comparing of (a) basic data collection and (b) CDG [3]. B. Pipeline Scheduling Thanks to the benefit brought by CDG, we can address the continuous data collection problem with the pipeline technique. From the building process of the routing tree T, we know that the nodes in T can be divided into sets by levels D e, D L, C L 1, D L 1, C L 2,..., D 1, C 0, D 0 = {s 0 } in a bottom-up way, where D e is the set of all the dominatees, D i (0 i L ) is the set of the dominators at the i-th level, and C i (0 i L 1) is the set of the connectors at the i-th level. Since every node has two radios, one radio can be dedicated to receive data and the other is dedicated to transmit data. Therefore, the nodes at every level can receive and transmit data simultaneously over different channels. Consequently, for a continuous data collection task consisting of N snapshots, we propose a pipeline scheduling algorithm as follows. Step 1: All the nodes in D e transmit the packets of the j-th (1 j N 1) snapshot to their parent nodes in the CDG way, i.e. for every node s D e, s multiplies its data with M random coefficients respectively, and sends the M products to its parent node. After all the packets of the j-th snapshot have been transmitted successfully, the nodes in D e immediately transmit the packets of the (j + 1)-th snapshot in the CDG way. Step 2: After all the nodes in D l (1 l L ) receive all the packets of the j-th snapshot from their child-level, they send the packets of the j-th snapshot to their parent nodes in the CDG way, i.e. every node s D l combines its packet of the j-th snapshot with the received packets of the j-th snapshot, and sends the M new packets to its parent node. After all the packets of the j-th snapshot have been transmitted successfully, the nodes in D l immediately transmit the packets of the (j + 1)-th snapshot to their parent nodes in the CDG way, if they have received all the packets of the (j + 1)-th snapshot from their child-level. Step 3: After all the nodes in C l (0 l L 1) receive all the packets of the j-th snapshot from their child-level, they send the packets of the j-th snapshot to their parent nodes in the CDG way, i.e. every node s C l combines its packet of the j-th snapshot with the received packets of the j-th snapshot, and sends the M new packets to its parent node. After all the packets of the j-th snapshot have been transmitted successfully, the nodes in C l immediately transmit the packets of the (j+1)-th snapshot in the CDG way if they have received all the packets of the (j +1)-th snapshot from their child-level. Step 4: The sink restores the data of a snapshot in the CDG way after it receives all the packets of this snapshot. Steps 1-4 provide the general frame of our pipeline scheduling scheme. Now, we discuss how to prevent radio confliction and channel interference in Steps 1-3. If two or more nodes have the same parent node, we call them sibling nodes. In Steps 1-3, radio confliction may arise if two or more sibling nodes send data to their parent node simultaneously even over different orthogonal channels. This is because every sensor only has one radio dedicated to receiving data. Suppose that there are at most e (resp., d and c ) nodes in D e (resp., D l (1 l L ) and C l (1 l L 1)) which have the same parent node. Usually, e < (T ) except in onehop SNs, where any sensor is just one hop away from the sink, e = (T ). Then, d 4 and c 11 (Note that C 0 12.) (see Section III-B). To avoid confliction, we divide the nodes in D e (resp., D l and C l ) into e (resp., d and c ) subsets to guarantee that each node belongs to one subset and no sibling nodes belong to the same subset. Then, when we schedule the nodes of each level, we schedule these subsets in a certain order. For the nodes in C 0, we schedule them in a certain order. Different from the multi-path scheduling algorithm, in which a sensor sends one packet over a link in one time slot, we employ CDG, where a sensor sends M packets for a snapshot. e now introduce the concept of a Super Time Slot (STS) which consists of M time slots. In a STS, a sensor can send M packets over a channel for a snapshot. For the links working simultaneously, we assign channels and STSs in the similar way of the multi-path scheduling algorithm. C. Capacity Analysis In this subsection, we analyze the achievable network capacity of the proposed pipeline scheduling algorithm. Lemma 6 indicates the inductivity (Section III-C) of the corresponding conflicting graph of the links scheduled simultaneously in the pipeline scheduling algorithm. Lemma 6: Suppose that A is the set of the links in T scheduled simultaneously in the pipeline scheduling algorithm, and R(A) is the corresponding conflicting graph of A, then, δ (R(A)) 2β ρ+2 1, where δ (R(A)) is the inductivity of R(A). Proof: Please refer to [21]. Based on the result of Lemma 6, we can determine the number of the STSs used to schedule all the links in A as follows. 1067

7 Lemma 7: For the links of set A in Lemma 6, we can use STSs to schedule them without channel interference. Proof: Please refer to [21] of this paper. From the pipeline scheduling algorithm we know that the transport of subsequent snapshots has some time overlap with the transport of preceding snapshots. Therefore, we first analyze the time used to collect the packets of the first snapshot since it is the base of the pipeline, and then analyze the achievable capacity of the entire pipeline. Theorem 2: The number of the time slots used to collect the packets of the first snapshot by the pipeline scheduling algorithm is at most M ( e + 15L + 1). Proof: In Step 1 of the pipeline scheduling algorithm, we divide the nodes in D e into e subsets and schedule them in a certain order. By Lemma 7, each scheduling uses at most STSs. Consequently, Step 1 needs at most e STSs to finish the scheduling for the first snapshot. Similarly, Step 2 (resp., Step 3) needs at most 4L (resp., 11(L 1) ) STSs to finish the scheduling for the first snapshot. Furthermore, it needs at most 12 STSs for C 0 to transmit the packets for the first snapshot to the sink. In summary, the total number of the STSs used for the first snapshot is at most e + 4L + 11(L 1) +12 = ( e + 15L + 1). Since every STS has M time slots, then the number of the time slots usedfor the collection of the first snapshot is at most M ( e + 15L + 1). On the basis of the result in Theorem 2, we obtain the number of the time slots used to collect all the packets of N continuous snapshots for the pipeline scheduling algorithm as shown in Theorem 3. Theorem 3: The time slots used for the pipeline scheduling algorithm to collect N continuous snapshots are at most M ( e + 15L + 12N 11) when e 12 or M (N e + 15L + 1) when e > 12. Proof: From the proof of Theorem 2 we know, it takes the nodes in D e (resp., D l (1 l L ), C l (1 l L 1) and C 0 ) at most e (resp., 4, 11 and 12 ) STSs to transmit packets for a snapshot. In order to obtain the upper bound of the number of the time slots used, we assume the STSs used by nodes in D e (resp., D l (1 l L ), C l (1 l L 1) and C 0 ) are e (resp., 4, 11 and 12 ) in the following proof. Then, we prove Theorem 3 by cases. Case 1: e 4. For clearness, we use the transmission of two snapshots S-1 and S-2 shown in Figure 4(a) as an example for explanation. In Figure 4(a), the vertical axis denotes the levels in the routing tree T and the horizontal axisdenotes time slots. t e = e, t d = 4, t c = 11, and t 0 = 12. From Figure 4(a) we know, the nodes at D e - level begin to send packets of S-2 immediately after they send out the packets of S-1. Since e 4, after the nodes at D L - level receive all the packets of S-2, they may still be busy with the transmission of packets of S-1. Nevertheless, from the C L 1-level to the D 1 -level, the pipeline can be utilized in a maximum degree, which means whatever the packets of S-1 or the packets of S-2, they can be sent immediately. After the packets of S-2 are sent from the nodes at D 0 -level to the nodes in C 0, they may have to wait for a while at the nodes of the C 0 -level, since the transmission for the packets of S-1 may last for as long as 12 STSs. This implies the sink will receive all the packets of S-2 in 12 STSs after it receives all the packets of S-1. According to the description of the pipeline scheduling algorithm, the subsequent snapshots will be transmitted in the same way, which means the sink will receive all the packets of a snapshot at most every 12 STSs after it receives the packets of the first snapshot which takes at most M ( e + 15L + 1) time slots by Theorem 2. As a result, the number of time slots used to collect the packets of N continuous snapshots by the pipeline scheduling algorithm is at most M = M = M ( e + 15L + 1) + (N 1) 12M ( e + 15L N 12) ( e + 15L + 12N 11). Case 2: 4 < e 11 and Case 3: e = 12. These two cases can be proved by the similar method used in Case 1. The number of the time slots used to collect the packets of N continuous snapshots is also at most M ( e +15L + 12N 11). Case 4: e > 12. e use the data transmission of two snapshots shown in Figure 4(b) as an example to show the proof process. Since e > 12, the pipeline can be utilized in a maximum degree at D L -level and continue to C 0 -level. Then, the sink can receive all the packets of a subsequent snapshot every e STSs after it receives the packets of the first snapshot. Therefore, the number of the time slots used to collect the packets of N continuous snapshots is at most M = M = M ( e + 15L + 1) + (N 1) e M ( e + 15L (N 1) e ) (N e + 15L + 1). As a conclusion, Theorem 3 is true. Theorem 3 shows the number of the time slots used to collect N continuous snapshots. This prepares us to derive the achievable capacity of the pipeline scheduling algorithm. 1068

8 Levels Levels t e t d t e t d t c S-1 t 0 S t c (a) S-1 t 0 S (b) Time Slots Fig. 4. Data transport in (a) Case 1 and (b) Case 4. Time Slots Theorem 4: For a long-run continuous data collection, the lower bound of the achievable asymptotic network capacity of the pipeline scheduling algorithm is when e 12 or when M e( 3.63 e > 12. Proof: e prove Theorem 4 in two cases. Case 1: e 12. In this case the number of the time slots used to collect N continuous snapshots is at most M ( e + 15L + 12N 11) as proved in Theorem 3. Therefore, the lower bound of the capacity of the pipeline scheduling algorithm is N nb tm ( e+15l +12N 11) nb = tm ( e N + 15L 11 N +12 N ) = M ( e N + 15L 11 N +12 ). N hen N, the above equation approaches to, which means the asymptotic 12M network capacity in this case is. Case 2: e > 12. The asymptotic network capacity in this case is, which can be proved by the similar M e ( 3.63 method as in Case 1. In a dual-radio multi-channel SN, since every node has two radios, the upper bound of the network capacity is 2. This is because the sink can receive at most two packets in one time slot. From Theorem 4, it is possible for both and to be greater than 2. M e ( 3.63 There are two main reasons for this result. The most important one is the pipeline scheduling, which accelerates the data collection process directly and significantly, and as a result the network capacity is increased obviously. Another reason is the use of the CDG method. As indicated in [3], CDG reduces the total number of transmission times of packets in some degree. These two reasons are also validated by the simulation results in Section VI. Furthermore, we find that the pipeline scheduling algorithm is more effective for large scale SNs, since large scale SNs are more suitable for pipeline. The pipeline scheduling algorithm is also more effective for a long time of continuous data collection, which can also be seen from Theorem 4. VI. SIMULATIONS AND RESULT ANALYSIS e conducted simulations to verify the performances of the proposed algorithms through implementing them with the C language. For all the simulations, we assume every SN has one sink, and all the sensor nodes of each SN are randomly distributed in a square area and the communication radius of each node is normalized to one. Suppose the network MAC layer works with TDMA, i.e. the network time can be slotted. Every node produces one data packet in a snapshot and the size of a packet is normalized to one. Every available channel has the same bandwidth normalized to one. For any two different channels, we suppose they are orthogonal, i.e. the communications initialized over any two channels have no wireless interference. Furthermore, we assume a packet can be transmitted over a channel within a time slot. The compared algorithms are BFS [5], SLR [17] and CDG [3]. BFS is a snapshot data collection algorithm based on a breadth first search tree and scheduling is carried out path by path. BFS is specifically proposed for single-radio single-channel SNs. SLR is a straight-line routing method for multi-unicast communication in multi-channel wireless networks. e extend BFS and SLR to the general dual-radio multi-channel scenario in our simulations for fairness. The proposed multi-path scheduling algorithm is referred to as MPS and the pipeline scheduling algorithm is referred to as PS. In the remainder of this section, AR refers to the square area where a SN is deployed. ρ, n,, M, and N have the same meanings as mentioned before, respectively. A. Performance of MPS The snapshot data collection capacities of MPS, BFS, and SLR are shown in Figure 5. In Figure 5(a), the capacity of every algorithm increases when the number of the available channels increases, since more available channels enable more concurrent transmissions. MPS achieves a higher capacity compared with BFS and SLR. This is because MPS simultaneously schedules all the paths without radio confliction (except at the sink). hereas, BFS just schedules links without radio confliction on one path every time and SLR schedules all the transmission links simultaneously, which leads to serious radio confliction. On average, MPS achieves 77.49% and 41.95% more capacity than BFS and SLR, respectively. The effect of interference radius on capacity is shown in Figure 5(b). ith the increase of interference radius, more transmission interference occurs, which leads to the decrease of the capacities of all the algorithms. Nevertheless, MPS still achieves the largest capacity since it simultaneously schedules multiple paths without radio confliction, which suggests a nice tradeoff between BFS and SLR. On average, MPS achieves 67.45% and 37.37% more capacity than BFS and SLR, respectively. B. Performance of PS Since CDG, BFS, and SLR do not consider pipeline, they collect data snapshot by snapshot in continuous data collection. The continuous data collection capacities of PS, CDG, BFS, 1069

9 Capacity MPS BFS SLR (a) Capacity vs. (ρ=2) Capacity MPS BFS SLR (b) Capacity vs. ρ (=3) Fig. 5. Snapshot Data Collection Capacity (n = 4000, AR = 30 30). and SLR in different network scenarios are shown in Figure 6. Figure 6(a) reflects the effect of the number of the available channels on capacity. As explained before, the capacities of all the algorithms increase as more and more channels are available. PS has a much higher capacity compared with the other three algorithms. This is because: first and the most important, PS utilizes the pipeline technology; second, for the data of a single snapshot, PS collects them in the CDG way, which reduces the overall data transmission times. This also explains why CDG has a higher capacity compared with BFS and CDG. On average, PS achieves a capacity of 8.22 times of that of CDG, times of that of BFS and times of that of SLR, respectively. The effect of interference radius on capacity is shown in Figure 6(b). ith the increase of interference radius, a transmission link will interfere with more and more other transmission links, which leads to the decrease of capacity whatever algorithm it is. PS has the highest capacity among all the algorithms since it works with pipeline and CDG. On average, PS achieves a capacity of 7.31 times of that of CDG, times of that of BFS and times of that of SLR, respectively. Capacity PS CDG BFS SLR (a) Capacity vs. (ρ=2) Capacity (b) Capacity vs. ρ (=3) Fig. 6. Continuous Data Collection Capacity in Different Scenarios (n=10000, AR=50 50, N=1000, M=100). VII. CONCLUSION Motivated by the fact that there exist no works studying the capacity of continuous data collection, we investigate this problem in dual-radio multi-channel SNs. e first propose a multi-path scheduling algorithm for the snapshot data collection problem and prove that its achievable network capacity is at least 3.63 ρ2 +o(ρ) PS CDG BFS SLR. For the continuous data collection problem, although the authors in [5] claim that it can be solved by combining the pipeline technology with the existing works, we however find that pipeline with the existing works cannot actually improve the network capacity. e explain the reason of this, and then propose a novel continuous data collection method for dual-radio multi-channel SNs. This method speeds up the data collection process significantly. Theoretical analysis of this method shows that the achievable asymptotic network capacity is when e 12, or when M e ( 3.63 e > 12. The simulation results indicate that the proposed algorithms improve network capacity significantly compared with the existing works. ACKNOLEDGEMENT This work is partly supported by the NSF under grant No. CCF , and NSF China under grant No and REFERENCES [1] P.-J. an, S. C.-. uang, L. ang, Z. an and X. Jia, Minimum- Latency Aggregation Scheduling in Multihop ireless Networks, Mobihoc 2009, [2] C. Joo, J. Choi, and N. B. Shroff, Delay Performance of Scheduling with Data Aggregation in ireless Sensor Networks, Infocom [3] C. Luo, F. u, J. Sun, and C.. Chen, Compressive Data Gathering for Large-Scale ireless Sensor Networks, MobiCom [4] X. Zhu, B. Tang, and. Gupta, Delay Efficient Data Gathering in Sensor Networks, MSN [5] S. Chen, S. Tang, M. uang, and Y. ang, Capacity of Data Collection in Arbitrary ireless Sensor Networks, Infocom [6]. Cheng, X. Chen, T. Znati, X. Lu and Z. Lu, The Complexity of Channel Scheduling in Multi-Radio Multi-Channel ireless Networks, Infocom [7] P. Kyasanur and N.. Vaidya, Capacity of Multi-Channel ireless Networks: Impact of number of channels and interfaces, Mobicom 2005, [8] P. Gupta and P. R. Kumar, The Capacity of ireless networks, IEEE Trans. Inform. Theo., [9] C. Chau, M. Chen and S. C. Liew, Capacity of Large-Scale CSMA wireless Networks, Mobicom [10] O. Goussevskaia, R. attenhofer, M. M. alldorsson and E. elzl, Capacity of Arbitrary ireless Networks, Infocom [11] X.-Y. Li, S.-J. Tang and O. Frieder, Multicast Capacity for Large Scale ireless Ad oc Networks, Mobicom [12] S. Li, Y. Liu and X.-Y. Li, Capacity of Large Scale ireless Networks Under Gaussian Channel Model, Mobicom [13] U. Niesen, P. Gupta and D. Shah, On Capacity Scaling in Arbitrary ireless Networks, IEEE Transactions on Information Theory, 55(9): , [14] Z. ang,. R. Sadjadpour and J. J. Garcia-Luna-Aceves, A Unifying Perspective on the Capacity of ireless Ad oc Networks, Infocom [15] Y. Xu and. ang, Scheduling Partition for order optimal capacity in large-scale wireless networks, Mobicom [16] M. Garetto, P. Giaccone and E. Leonardi, On the Capacity of Ad oc ireless Networks Under General Node Mobility, Infocom [17] V. Bhandari and N.. Vaidya, Connectivity and Capacity of Multi- Channel ireless Networks with Channel Switching Constraints, Infocom [18]. Dai, K. Ng, R. C.-. ong and M. u, On the Capacity of Multi- Channel ireless Networks Using Directional Antennas, Infocom [19] X.-Y. Li, J. Zhao, Y.. u, S. J. Tang, X.. Xu and X. F. Mao, Broadcast Capacity for ireless Ad oc Networks, MASS [20] D.. Matula and L. L. Beck, Smallest-Last Ordering and Clustering and Graph Coloring Algorithms, Journal of the Association of Computing Machinery, 30(3): , [21] S. Ji, Y. Li and X. Jia, Capacity of Dual-Radio Multi-Channel ireless Sensor Networks for Continuous Data Collection,

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Peng-Jun Wan 1,ZhuWang 1,ZhiyuanWan 2,ScottC.-H.Huang 2,andHaiLiu 3 1 Illinois Institute of Technology,

More information

Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks

Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks Shouling Ji Department of Computer Science Georgia State University Atlanta, Georgia 30303, USA Email:

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and

More information

CONVERGECAST, namely the collection of data from

CONVERGECAST, namely the collection of data from 1 Fast Data Collection in Tree-Based Wireless Sensor Networks Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi (USC CENG Technical Report No.: ) Abstract We investigate

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Min Kyung An Department of Computer Science Sam Houston State University Huntsville, Texas 77341, USA Email: an@shsu.edu

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

MULTI-HOP wireless networks consist of nodes with a

MULTI-HOP wireless networks consist of nodes with a IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Minimum Latency Broadcast Scheduling in Duty-Cycled Multi-Hop Wireless Networks Xianlong Jiao, Student Member, IEEE, Wei Lou, Member, IEEE, Junchao

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks

Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks 2010 International Conference on Distributed Computing Systems Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks Xianlong Jiao,WeiLou, Junchao Ma, Jiannong Cao, Xiaodong

More information

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.

More information

Opportunistic cooperation in wireless ad hoc networks with interference correlation

Opportunistic cooperation in wireless ad hoc networks with interference correlation Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Lixin Wang, Peng-Jun Wan, and Kyle Young Department of Mathematics, Sciences and Technology, Paine College, Augusta, GA 30901,

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation

Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation Hongxing Li, Chuan Wu, Dongxiao Yu, Qiang-Sheng Hua and Francis C.M. Lau Department of Computer

More information

Approximation Algorithms for Interference Aware Broadcast in Wireless Networks

Approximation Algorithms for Interference Aware Broadcast in Wireless Networks Approximation Algorithms for Interference Aware Broadcast in Wireless Networks Dianbo Zhao University of Wollongong Email: dz985@uowmail.edu.au Kwan-Wu Chin Univiversity of Wollongong Email: kwanwu@uow.edu.au

More information

Rumors Across Radio, Wireless, and Telephone

Rumors Across Radio, Wireless, and Telephone Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu

More information

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

The Worst-Case Capacity of Wireless Sensor Networks

The Worst-Case Capacity of Wireless Sensor Networks The Worst-Case Capacity of Wireless Sensor Networks Thomas Moscibroda Microsoft Research Redmond WA 98052 moscitho@microsoft.com ABSTRACT The key application scenario of wireless sensor networks is data

More information

OVSF-CDMA Code Assignment in Wireless Ad Hoc Networks

OVSF-CDMA Code Assignment in Wireless Ad Hoc Networks Algorithmica (2007) 49: 264 285 DOI 10.1007/s00453-007-9094-6 OVSF-CDMA Code Assignment in Wireless Ad Hoc Networks Peng-Jun Wan Xiang-Yang Li Ophir Frieder Received: 1 November 2004 / Accepted: 23 August

More information

Radio Aggregation Scheduling

Radio Aggregation Scheduling Radio Aggregation Scheduling ALGOSENSORS 2015 Rajiv Gandhi, Magnús M. Halldórsson, Christian Konrad, Guy Kortsarz, Hoon Oh 18.09.2015 Aggregation Scheduling in Radio Networks Goal: Convergecast, all nodes

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks

Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks Mingyuan Yan, Shouling Ji,, and Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, Georgia 333, USA Email:

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls

Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls Michelle X. Gong, Shiwen Mao and Scott F. Midkiff Networking Technology Lab, Intel Corporation, Santa Clara, CA 9 Dept. of

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks 1 Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks Guobao Sun, Student Member, IEEE, Fan Wu, Member, IEEE, Xiaofeng Gao, Member, IEEE, Guihai Chen, Member, IEEE, and Wei Wang,

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networs Siyuan Chen Minsu Huang Yang Li Ying Zhu Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Sensor Networks. Distributed Algorithms. Reloaded or Revolutions? Roger Wattenhofer

Sensor Networks. Distributed Algorithms. Reloaded or Revolutions? Roger Wattenhofer Roger Wattenhofer Distributed Algorithms Sensor Networks Reloaded or Revolutions? Today, we look much cuter! And we re usually carefully deployed Radio Power Processor Memory Sensors 2 Distributed (Network)

More information

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization. 3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

Interference-Aware Broadcast Scheduling in Wireless Networks

Interference-Aware Broadcast Scheduling in Wireless Networks Interference-Aware Broadcast Scheduling in Wireless Networks Gruia Calinescu 1,, Sutep Tongngam 2 Department of Computer Science, Illinois Institute of Technology, 10 W. 31st St., Chicago, IL 60616, U.S.A.

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

Phase Transition Phenomena in Wireless Ad Hoc Networks

Phase Transition Phenomena in Wireless Ad Hoc Networks Phase Transition Phenomena in Wireless Ad Hoc Networks Bhaskar Krishnamachari y, Stephen B. Wicker y, and Rámon Béjar x yschool of Electrical and Computer Engineering xintelligent Information Systems Institute,

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

Revisiting Neighbor Discovery with Interferences Consideration

Revisiting Neighbor Discovery with Interferences Consideration Author manuscript, published in "3rd ACM international workshop on Performance Evaluation of Wireless Ad hoc, Sensor and Ubiquitous Networks (PEWASUN ) () 7-1" DOI : 1.115/1131.1133 Revisiting Neighbor

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Maximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks

Maximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks Maximum Achievable Throughput in Multi-Band Multi-Antenna Wireless Mesh Networks Bechir Hamdaoui and Kang G. Shin Abstract We have recently witnessed a rapidly-increasing demand for, and hence a shortage

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Xiaobing Wu 1, Jiangchuan Liu 2, Guihai Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China wuxb@dislab.nju.edu.cn,

More information

arxiv: v1 [cs.it] 12 Jan 2011

arxiv: v1 [cs.it] 12 Jan 2011 On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom

More information

Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies John Gibson * Geoffrey G.

Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies John Gibson * Geoffrey G. In proceedings of GLOBECOM Ad Hoc and Sensor Networking Symposium, Washington DC, November 7 Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies John Gibson *

More information

Mobility and Fading: Two Sides of the Same Coin

Mobility and Fading: Two Sides of the Same Coin 1 Mobility and Fading: Two Sides of the Same Coin Zhenhua Gong and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {zgong,mhaenggi}@nd.edu Abstract

More information

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks 1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

BBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks

BBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks International Journal of Distributed Sensor Networks, : 3 54, 006 Copyright Taylor & Francis Group, LLC ISSN: 1550-139 print/1550-1477 online DOI: 10.1080/1550130500330711 BBS: An Energy Efficient Localized

More information

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Roberto Hincapie, Li Zhang, Jian Tang, Guoliang Xue, Richard S. Wolff and Roberto Bustamante Abstract Cognitive radios allow

More information

Transmission Delay in Large Scale Ad Hoc Cognitive Radio Networksi

Transmission Delay in Large Scale Ad Hoc Cognitive Radio Networksi Transmission Delay in Large Scale Ad Hoc Cognitive Radio Networks 1 Transmission Delay in Large Scale Ad Hoc Cognitive Radio Networksi Zhuotao Liu 1, Xinbing Wang 1, Wentao Luan 1 and Songwu Lu 2 1 Department

More information

Cooperative Routing in Wireless Networks

Cooperative Routing in Wireless Networks Cooperative Routing in Wireless Networks Amir Ehsan Khandani Jinane Abounadi Eytan Modiano Lizhong Zheng Laboratory for Information and Decision Systems Massachusetts Institute of Technology 77 Massachusetts

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization

More information

Analysis of k-hop Connectivity Probability in 2-D Wireless Networks with Infrastructure Support

Analysis of k-hop Connectivity Probability in 2-D Wireless Networks with Infrastructure Support Analysis of k-hop Connectivity Probability in 2-D Wireless Networks with Infrastructure Support Seh Chun Ng and Guoqiang Mao School of Electrical and Information Engineering, The University of Sydney,

More information

Optimal Transceiver Scheduling in WDM/TDM Networks. Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE

Optimal Transceiver Scheduling in WDM/TDM Networks. Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 8, AUGUST 2005 1479 Optimal Transceiver Scheduling in WDM/TDM Networks Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE

More information

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional

More information

Broadcast with Heterogeneous Node Capability

Broadcast with Heterogeneous Node Capability Broadcast with Heterogeneous Node Capability Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA. email: {kangit,radha}@ee.washington.edu Abstract

More information

THE field of personal wireless communications is expanding

THE field of personal wireless communications is expanding IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,

More information

Noisy Index Coding with Quadrature Amplitude Modulation (QAM)

Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian

More information

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial

More information

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling On Achieving Local View Capacity Via Maximal Independent Graph Scheduling Vaneet Aggarwal, A. Salman Avestimehr and Ashutosh Sabharwal Abstract If we know more, we can achieve more. This adage also applies

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

A Deterministic Approach to Throughput Scaling in Wireless Networks

A Deterministic Approach to Throughput Scaling in Wireless Networks A Deterministic Approach to Throughput Scaling in Wireless Networks Sanjeev R. Kulkarni and Pramod Viswanath 1 Nov, 2002 Abstract We address the problem of how throughput in a wireless network scales as

More information

Analysis of Power Assignment in Radio Networks with Two Power Levels

Analysis of Power Assignment in Radio Networks with Two Power Levels Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two

More information

The Complexity of Connectivity in Wireless Networks

The Complexity of Connectivity in Wireless Networks The Complexity of Connectivity in Wireless Networks Thomas Moscibroda Computer Engineering and Networks Laboratory ETH Zurich, Switzerland moscitho@tik.ee.ethz.ch Roger Wattenhofer Computer Engineering

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Randomized Channel Access Reduces Network Local Delay

Randomized Channel Access Reduces Network Local Delay Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

S-GPBE: A Power-Efficient Broadcast Routing Algorithm Using Sectored Antenna

S-GPBE: A Power-Efficient Broadcast Routing Algorithm Using Sectored Antenna S-GPBE: A Power-Efficient Broadcast Routing Algorithm Using Sectored Antenna Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA. - email: {kangit,radha}@ee.washington.edu

More information

Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks

Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks Lijie Xu, Jiannong Cao,

More information

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Won-Yeol Lee and Ian F. Akyildiz Broadband Wireless Networking Laboratory School of Electrical and Computer

More information

Broadcasting in Conflict-Aware Multi-Channel Networks

Broadcasting in Conflict-Aware Multi-Channel Networks Broadcasting in Conflict-Aware Multi-Channel Networks Francisco Claude 1, Reza Dorrigiv 2, Shahin Kamali 1, Alejandro López-Ortiz 1, Pawe l Pra lat 3, Jazmín Romero 1, Alejandro Salinger 1, and Diego Seco

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information