Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation

Size: px
Start display at page:

Download "Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation"

Transcription

1 Link State Routing Overhead in Mobile Ad Hoc Netorks: A Rate-Distortion Formulation Di Wang and Alhussein A. Abouzeid Department of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute Abstract In this paper e use an information-theoretic formulation for characterizing the minimum routing overhead of link state routing in a mobile ad hoc netork. We formulate the minimum overhead problem as a rate-distortion problem. We evaluate loer bounds on the minimum overhead incurred by maintaining link state information hen link state routing protocols are designed ith guaranteed delivery ratio for data packets. We also characterize the deficit caused by the routing overhead on the overall transport capacity of a mobile netork. Further e derive a threshold value for the delivery error ratio, and conclude that no link state routing protocol can achieve a delivery error ratio smaller than this threshold. I. INTRODUCTION Routing in mobile ad hoc netorks faces strong challenges due to dynamically changing netork structure and limited communication resources. We vie that the primary objective of a routing protocol is to maintain state information such that packets can be forarded ithin an acceptable quality metric. The state information may be comprised of link states, node locations, velocity of nodes, queue lengths, etc. The quality metric could be minimum delay, maximum throughput, maximum lifetime or merely best effort delivery of packets. The design of routing protocols can be vieed as choosing a subset of classes of state information about the netork, and then specify hen and ho to collect and disseminate the chosen state information. The process of collecting state information incurs routing overhead. A number of routing protocols have been designed, and they differ from each other by selecting different subsets of classes of the state information. It may be difficult to make a comprehensive comparison among all the routing protocols, since there are many types of evaluation criteria to be used and many netork scenarios to be tested. The premise of this ork as ell as related prior ork [] and [] is that, instead of trying to find the best available protocol under certain cases, e could characterize the routing overheads incurred by a fe key classes of routing protocols. The ork in [] addressed the overhead for the class of topology-based hierarchical routing protocols, hile [] considers geographic routing protocols. This paper evaluates the overhead for the class of link state routing protocols under a flat non-hierarchical netork structure in hich nodes have identical protocol responsibilities. We present an information-theoretic frameork for characterizing the minimum overhead incurred by link state routing protocols. The key departure point of this frameork is to treat the link state as a random variable/process that exhibits random changes. The minimum routing overhead is the minimum amount of state information rate needed to be received by the nodes, such that the current state of the netork can be identified ithin a certain distortion bound. This necessitates the use of information theory and rate-distortion theory as a tool for developing loer bounds on the routing overhead. In this paper e study the class of proactive link state routing protocols, in hich each node collects the link state information of the netork from other nodes such that it can compute paths and thus make routing decisions immediately upon the arrival of data packets. In our analysis, the actual link status of a link and the perceived link status by an arbitrary node say, node k are both treated as random processes. To types of errors associated ith these to processes may occur at node k: the actual link status of a link is don but is perceived as up by k; the actual link status is up but is perceived as don by k. The link state routing overhead is the bit rate at hich a node must receive link state information such that the probabilities that the to types of errors may occur are bounded. We formulate the problems of finding the minimum value of these bit rates as rate-distortion problems see e.g. [3] for an introduction to rate-distortion theory. Using the rate-distortion formulation, e present loer bounds on minimum link state routing overhead for fixed distortions δ and δ for the to types of errors. We further sho that there is a connection beteen the probabilities that the to types of errors may occur, and the data packet delivery ratio η in the netork layer. This allos us to derive a loer bound on the minimum overhead for link state routing protocols ith guaranteed delivery ratio η. This result is then connected ith the results on the transport capacity of multi-hop ireless netorks evaluated in [4] in order to characterize the effective capacity available for users. It is observed that a delivery error ratio η cannot be achieved by any link state routing protocols if it is smaller than some threshold value η. In this paper e exclusively consider the scenario here the routing protocol initiates forarding process as soon as a packet arrives at the source. Thus the capacity improvement due to node mobility achieved at the cost of delay associated ith aiting for the destination to move to a nearby location pointed out in [5], [6] is not applicable to our ork. The class of link state routing protocols is dominant in ired netorks [7]. Hoever, hen migrating from the ired to ireless, conventional link state routing protocols may incur

2 large amount of overhead and thus face scalability challenges [8]. To improve the scaling properties of link state routing, a number of modified protocols have been proposed [9], [], [], [], [3], [4]. Specifically, fish eye routing described in [9], [] and [] introduces the notion of multilevel fisheye scope to reduce routing overhead through reducing the routing packet sizes and update frequency. Optimized link state routing protocols OLSR [] produce less control overhead as it forces the propagation of link state updates only at multipoint relay nodes [3]. Similarly, topology broadcast based on reverse path forarding TBRPF protocols [4] reduce link state update forarding at leaf nodes of each source tree and disseminates differential updates. To the best of our knoledge, there is still no theoretical ork reported on finding the minimum link state routing overhead. The objective of this ork is to fill in this gap. The relation beteen this paper and the existing related ork for modeling and analysis of protocol overhead can be summarized as follos. One of the earliest and pioneering orks that use information theory to understand protocol overhead in communication netorks can be found in [5]. Gallager [5] used an information-theoretic method to characterize the minimum amount of protocol information required to keep track of the sender, receiver and timing of messages for a simple stationary netork model. It is pointed out that if the packet lengths are small compared to the random interarrival times, then the protocol overhead required per packet can be prohibitively high. Several relatively recent papers that use information theory to understand the effects of mobility on ireless netorks can be found in [7], [8], [] and []. In [7], the authors propose the entropy of link change as the metric for mobility models against hich performance of ireless netork protocols must be evaluated. Authors of [8] use rate-distortion theory to investigate the optimal timing for updating a certain link state metric e.g. bandidth such that the update rate is minimized ithin a given cost constraint. One of our prior orks [] uses an information-theoretic approach to characterize the minimum routing overhead and memory requirements of hierarchical routing protocols for ad hoc netorks. Our ork shares a similar flavor ith another one of our prior ork [], in hich the family of geographic routing protocols are studied and rate-distortion loer bounds on geographic routing overhead are derived. Compared to [], [] and other related orks, our main contributions may be summarized as follos: We present an information-theoretic formulation for evaluating routing overhead incurred by link state routing. As compared to our prior ork [], apart from the different netork structures studied flat and hierarchical, the routing protocol model used in [] specifies the exact mechanisms about hen and ho to update netork state information. Such specifications are not used in this ork and thus this formulation is more general. We evaluate loer bounds for the minimum rate at hich a node must receive link state information such that data Lt Y Z Z Z3 Y T T T3 T4 T5 T6 Fig.. An illustration of the relationship beteen random variables Lt, Y m and Z m associated ith node pair i, j. packets can be delivered ith guaranteed delivery ratio. 3 We characterize the effective transport capacity of a mobile ad hoc netork after taking into account the minimum routing overhead incurred by reliable link state routing. 4 We derive the threshold value η for the delivery error ratio, and point out that no link state routing protocols can achieve a delivery error ratio smaller than this threshold. The rest of this paper is organized as follos. The netork and routing protocol models are presented in Section II. The rate-distortion formulation and the evaluation of a loer bound on the minimum routing overhead are presented in Section III. With the results in Section III, the rate-distortion loer bounds on the overheads of link state routing protocols ith guaranteed delivery ratio are derived in Section IV-A, and a discussion of the capacity deficit caused by routing overheads is presented in Section IV-B. We present conclusions and future research directions in Section V. A. Netork Model II. MODEL The ad hoc netork consists of n mobile nodes all lying in a torus of unit area. The location of node i at time t is given by X i t, i =,...,n. The process X i } is stationary and ergodic ith stationary distribution uniform on the area of interest; moreover, the trajectories of different nodes are independent and identically distributed i.i.d.. Each node is equipped ith an omnidirectional antenna and the transmission radius is given by r. It is assumed that nπr >, hich is a necessary condition for netork connectivity. Let the random variable L ij t,} denote the link status beteen any to nodes i and j at time t, here represents the link state is up don. Formally,, if Xi t X L ij t = j t r,, otherise Note that L ij t is induced by X i t and X j t, thus it is also a stationary ergodic process. For the sake of notation simplicity, in the rest of this paper e ill use Lt instead of L ij t if there is no ambiguity. In order to facilitate the analysis, the folloing assumptions regarding L } are made: Assumption : All the processes L ij i j, i,j n} are assumed to be mutually independent. Although this assumption may not be true in general, theoretical analysis in [, Section III.C.4] and simulation studies presented in [6, Y3 t

3 Lt L ijt Encoder... Decoder ˆLk ij t t T T T3 T4 T5 T6 ˆLt Fig.. An illustration of encode-transmit-receive-and-decode procedure for node k to monitor the status of link i, j. ˆT ˆT ˆT3 = ˆT4 = T4 ˆT5 ˆT6 t Section 9] sho that the dependency beteen to neighboring links is eak and can be negligible. Assumption : The random process L is modeled as an alternating reneal process [9], hich is elaborated as follos. Let Y m } m= and Z m } m= denote the sequences of successive up and don time durations of Lt the relationship beteen Lt, Y m and Z m is briefly illustrated by Fig.. Both the sequence Y m } m= and the sequence Z m } m= are assumed to be independent and identically distributed i.i.d. ith probability density functions pdf f Y and f Z, respectively. Moreover, e assume that Y m } m= and Z m } m= are independent from each other. The expected values of Y m and Z m are denoted by µ Y and µ Z, respectively. For the convenience of further analysis, e define u as B. Link State Routing Protocol Model u = µ Y + µ Z A link state routing protocol requires each node to collect link state information from other nodes such that it can compute a path to any potential destination node in the netork. The process of collecting link state information produces a routing overhead. Specifically, the link state information of any given node pair i,j i j may be encoded and sent out as control packets by the routing protocol, and then may be received and decoded by some node k k =,...,n in order to allo node k to monitor the link status of i,j. The link state routing overhead associated ith node k is thus formed by bit streams of all such control packets received by node k, for any given k =,...,n. This encode-transmit-receive-and-decode procedure is illustrated by Fig.. The link status of i,j, hich is represented by Lt, is encoded by the link state routing protocol and then k sent to node k such that k is able to reproduce it as ˆL ij t for simplicity, e ill use ˆLt instead in the rest of this paper. Here e make to assumptions as follos: Assumption 3: It is assumed that the perceived link status ˆLt is updated and maintained based on the link state information collected by k from outside only. This means that node k does not make its on decisions to determine ˆLt at any given time t e.g., no prediction based schemes are used; link status is maintained and updated according to the received control packets only. Assumption 4: It is assumed that the positions of node i and j do not change significantly during the encode-transmitreceive-and-decode procedure described above. In other ords the time scale of forarding a packet is much smaller than that required for a significant change in position. Fig. 3. An example of i, j s link status Lt associated ith the sequence T m}, and the perceived link status ˆLt at node k associated ith the sequence ˆT m}. III. OVERHEAD ANALYSIS For any given nodes i, j and k, there are basically to types of errors associated ith i,j s link status Lt and the perceived link status ˆLt by k: type- error is the one that happens at time t if Lt = and ˆLt = ; type- error is the one that happens at time t if Lt = and ˆLt =. In this section e evaluate a loer bound on the minimum bit rate at hich a node must receive link state information, such that the time portions of these to types of errors are bounded from above by δ and δ, respectively. A. Notation and Rate-Distortion Formulation Definition : S is the set of time instants at hich type- error happens during the time interval [,], i.e., S = t t,lt =, ˆLt = }. Similarly, S is the set of time instants at hich type- error happens during the time interval [,], i.e., S = t t,lt =, ˆLt = }. Definition : D L, ˆL is the time portion of type- error in the link state information of node pair i,j at node k over a time period [,], i.e., D L, ˆL = Lt ˆLt dt 3 t S Similarly, D L, ˆL is the time portion of type- error in the link state information of node pair i,j at node k over a time period [, ], i.e., D L, ˆL = Lt ˆLt dt 4 t S Definition 3: T m } m= is the sequence of time instants at hich the link status of i,j changes i.e. the value of Lt changes. Based on the Assumption 3 and Assumption 4 made in Section II-B, it can be observed that every change in ˆLt follos after a change in Lt at some time instant T m and is folloed by a change in Lt at the time instant T m+. And there is at most one change in ˆLt beteen T m and T m+ for any given m. Let ˆT m denote such a change in ˆLt. Fig. 3 illustrates an example of Lt and ˆLt. It shos that ˆLt changes its value at ˆT and ˆT, and has T ˆT T and T ˆT T 3. It can be noted that ˆT m is not clearly defined for some values of m m = 3,4 for the example shon in

4 Fig. 3. To make the definition of ˆT m complete, e define ˆT 3 = ˆT 4 = T 4 in the example illustrated by Fig. 3. Formally, e have the folloing definition for ˆT m. Definition 4: Let ˆT m } m= denote a sequence of time instants hich is defined according to the folloing to cases: If ˆLt is not constant over T m,t m+, i.e., there exists c,} and τ T m,t m+ such that then let ˆLt = c, t Tm,τ; c, t τ,t m+, 5 ˆT m := τ; 6 If ˆLt is constant over T m,t m+, i.e., ˆLt = c,}, for any t T m,t m+, then let ˆT m := Tm, if Lt = c, t T m,t m+ ; T m+, if Lt c, t T m,t m+. Thus e have a sequence ˆT m : m =,,...}, ˆT =, here ˆT m denotes the time instant at hich ˆLt changes its value, and the folloing inequality 7 T m ˆT m T m+ 8 holds for m =,,,... Definition 5: Let N denote the number of changes in Lt during the time interval [, ]. Formally, Similarly, N is defined as N = supm T m } 9 N = supm ˆT m } For the sake of simplicity, e ill use N and N instead of N and N in the rest of this paper. By Definition 3-5, it is readily knon that N N N Then according to the netork model described in Section II- B, the average rate of i,j s link status changes is given by N lim = lim N = = µ Y + µ Z u Definition 6: T N and ˆT N are defined as random vectors such that T N = [T,T,...,T N ] and ˆT N = [ ˆT, ˆT,..., ˆT N ]. Define T := T = and ˆT := ˆT = for the trivial case N =. Definition 7: T N and ˆT N are defined as the sets of all possible vectors T N and ˆT N, respectively. Definition 8: P [t N ; ˆt N ] denotes the joint probability density function pdf of random vectors T N and ˆT N, ith t N T N and ˆt N ˆT N. Definition 9: D is the expected value of the time portion of type- error over the time period [,], i.e., [ ] [ = E = t N ; ˆt N ] D dt N dˆt N D D P t N T N,ˆt N ˆT N 3 is the expected value of the time portion of Similarly, D type- error over the time period [,], i.e., D [ = E D ] = P t N T N,ˆt N ˆT N [ t N ; ˆt N ] D dt N dˆt N 4 Definition : P δ,δ is defined as the family of pdfs P [t N ; ˆt N ] such that the folloing inequalities hold: T m ˆT m T m+ D δ D δ 5 No e ill present a rate-distortion based formulation to find the minimum bit rate required to represent the link state information such that the inequalities in 5 are satisfied. Definition : R δ,δ is defined as the rate-distortion function associated ith the time interval [,] the minimum bit rate at hich a node must receive link state information such that the inequalities in 5 are satisfied. According to [3], R δ,δ is given by R δ,δ = min P P δ,δ IT N ; ˆT N 6 here IT N ; ˆT N is the mutual information beteen T N and ˆT N. The minimum rate in bits/sec at hich a node must receive link state information of i,j such that a large fraction of packets are delivered, represented by Rδ,δ, is given by Rδ,δ = lim R δ,δ 7 In order to facilitate the analysis in the folloing section, e define another to rate-distortion functions as follos. Consider the i.i.d. sequence Y m } dran according to the pdf f Y y, y Y. Let Ŷm} denote the reconstruction of Y m }. We assume that for any given m, the folloing reconstruction constraint is satisfied: Ŷ m Y m 8 Let f Y, Ŷ y,ŷ be the joint pdf of Y and Ŷ, y,ŷ Y Ŷ. The distortion measure, d : Y Ŷ R+, is defined as dy,ŷ = ŷ y 9 Let F Y ǫ denote the family of the joint pdf f Y, Ŷ y,ŷ satisfying f Y, Ŷ y,ŷ =, for y > ŷ, and E[dy,ŷ] = y ŷ ŷ yf Y, Ŷ y,ŷdydŷ ǫ. Thus the rate-distortion function for Y is defined as follos. Definition : R Y ǫ is the rate-distortion function for source Y, ith reconstruction constraint 8 and distortion measure 9. According to [3], R Y ǫ is given by R Y ǫ = min IY ;Ŷ f Y, Ŷ y,ŷ FY ǫ

5 Similarly, e define R Z ǫ as the rate-distortion function for the i.i.d. sequence Z m } dran according to the pdf f Z z ith the same reconstruction constraint and distortion measure as in Definition. B. Link State Routing Overhead Lemma : The mutual information beteen T N and ˆT N satisfies the folloing relationship inf IT N ; ˆT N P P δ,δ N R Z δ N + R Y δ Proof: Note that = N N IT N ; ˆT N IT N ; ˆT N ITN ; ˆT N T N, if N = N + ;, otherise. 3 4 Then only need to sho that IT N ; ˆT N is no less than the right-hand side of equation 3. When N is odd, i.e., N = M + and M N, e have IT N ; ˆT N = IT M,T M+ ; ˆT M, ˆT M+ = IT M ; ˆT M, ˆT M+ + IT M+ ; ˆT M, ˆT M+ T M IT M ; ˆT M, ˆT M+ = IT M ; ˆT M + IT M ; ˆT M+ ˆT M IT M ; ˆT M 5 Thus only need to sho that 3 is true for N is even, i.e., N = M and M N. Using the standard definition of mutual information e get IT M ; ˆT M = ht M ht M ˆT M 6 here h denotes the differential entropy. Then e consider ht M ˆT M. Without loss of generality, e assume that L =, i.e. T = Y. Thus Then Y m = T m T m 7 Z m = T m T m 8 ht M ˆT M = M ht m T m, ˆT M 9 m= M m= ht m T m, ˆT m 3 = M ht m T m T m, ˆT m 3 m= = M hy m T m, ˆT m m= +hz m T m, ˆT m 3 Equation 3 follos from 9 since conditioning does not increase entropy, and 3 follos from 3 since ht m T m, ˆT m is already conditioned on T m, subtracting it from T m is similar to translating the random variable by a scalar. Equation 3 follos directly from 3, 7 and 8. Define a random vector U m such that U m = ˆT m T m 33 Since U m depends only on ˆT m and T m, e have hy m T m, ˆT m = hy m T m, ˆT m,u m hy m U m ; similarly e can get hz m T m, ˆT m hz m U m. Then e get the folloing upper bound for ht M ˆT M : ht M ˆT M M m= hy m U m + hz m U m 34 No consider ht M. Since Y,...,Y m,..., Z,...,Z m,... are independent, e have ht M = M m= By combining 6, 34 and 35, e get hy m + hz m 35 IT M ; ˆT M M IY m ;U m + IZ m ;U m 36 m= Define ρ Y m = E[U m Y m ] 37 ρ m Z = E[U m Z m ] 38 By equation 33 it is easy to verify that U m Y m and U m Z m. Thus by Definition e have IY m ;U m R Y ρ m Y 39 IZ m ;U m R Z ρ m Z 4 From 3, 8 and 3 e have [ ] D = E Lt ˆLt dt t S [ M ] E m Z m m=u = Similarly e can get D M ρ Z m= m 4 M = m= ρ Y m. By substituting 39 and 4 in 36 and noticing the fact that rate-distortion functions R Y and R Z are convex and non-increasing, e have IT M ; ˆT M M m= R Y ρ m Y + M R Z ρ Z MR Y M MR Y M m= ρ m Y m= M D MR Z δ M m M + MR Z M + MR Z + MR Y δ M M D ρ Z m m= 4

6 Hence e have proved this lemma. The folloing lemma provides a loer bound on the minimum rate in bits/sec at hich a node k must receive link state information about an arbitrary node pair i, j. Lemma : Under the distortion criterion parameterized by δ and δ, the loer bound on the minimum rate in bits/sec at hich a node k must receive link state information of an arbitrary node pair i,j is given by Rδ,δ hy + hz + log u e u 43 δ δ here u is defined in equation. Proof: From Equation, Lemma and the definitions of rate-distortion functions 6 and 7, it follos that Rδ,δ = lim R δ,δ N lim δ + RZ N N RY δ N = RZ uδ + R Y uδ 44 u According to Definition, the rate-distortion function R Y ǫ is given by R Y ǫ = min IY ;Ŷ 45 f Y, Ŷ y,ŷ FY ǫ Let Expoϕ denote the exponential distribution ith mean ϕ. Then IY ;Ŷ = hy hy Ŷ = hy hŷ Y Ŷ hy hŷ Y 46 hy h ExpoE[Ŷ Y ] 47 hy log eǫ 48 Here equation 47 follos from 46 since for a nonnegative random variable ith fixed mean, exponential distribution maximizes the differential entropy. 48 follos from 47 since f Y, Ŷ y,ŷ FY ǫ. Thus Similarly R Y ǫ hy log eǫ 49 R Z ǫ hz log eǫ 5 By substituting 49 and 5 in 44 e get 43 and hence have proved this lemma. Since there are totally nn node pairs and based on Assumption, e get the folloing theorem that provides a loer bound on the minimum rate at hich a node must receive link state information from the entire netork. Theorem : Under the distortion criterion parameterized by δ and δ, the loer bound on the minimum rate in bits/sec at hich a node must receive link state information from the entire netork, denoted by Φδ,δ, is given by nn Φδ,δ hy + hz + log u e u 5 δ δ Theorem implies that, apart from the distortion-related parameters δ and δ, mobility patterns impose a major impact on the minimum link state update rate, since it largely depends on hy, hz and u. C. Routing Overhead Under Markovian Mobility Pattern No e consider a special case for the mobility pattern, here e assume that both the up-time Z and don-time Y for each link follo exponential distributions. This assumption implies that the process Lt}, hich describes the link status changes, is a to-state Markov process. This allos us to derive closed-form results for the loer bound on Φ, and therefore e may gain some insights ithout involving ith complicated analysis. Since both Y and Z follo exponential distributions, then hy = log eµ Y 5 hz = log eµ Z 53 Since the process Lt is a stationary ergodic process see Section II-A, then it is readily knon that µ Z Pr[ i,j s link status is up ] = = πr 54 µ Y + µ Z By substituting, 5, 53 and 54 in 5, e get the folloing corollary. Corollary : When the netork is exhibiting Markovian link status changes, the loer bound on the minimum rate in bits/sec at hich a node must receive link state information from the entire netork under the distortion criterion parameterized by δ and δ, is given by Φ nn u log πr πr δ δ 55 IV. PRACTICAL IMPLICATIONS In the previous section, e evaluated the loer bound on the minimum rate of link state routing overhead such that the error in the link state information available at each node is bounded. In this section, e ill sho that this result can be applied to capture the interplay beteen control and data traffic, i.e., the tradeoff beteen the overhead incurred by control packets and the delivery ratio for data packets. Then e characterize the deficit caused by the routing overhead on the overall transport capacity of a mobile netork. Further e derive a threshold value for the delivery error ratio, and conclude that no link state routing protocols can achieve a delivery error ratio smaller than this threshold. A. The Tradeoff beteen Control and Data Traffic Consider the design of link state routing protocols so as to ensure that the delivery ratio for data packets is no less than η. In other ords, such protocols require each node to be able to compute a valid path for any possible destination ith probability no less than η. Let Ψ η denote the class of link state routing protocols capable of ensuring a delivery ratio of η. Then a loer

7 bound on the routing overhead of any protocol ψ Ψ η is given by the folloing theorem. Theorem : In order to ensure that the delivery ratio for data packets be no less than η, the loer bound on the minimum rate in bits/sec at hich a node must receive control packets, denoted by Φη, is given by Φη nn u hy + hz + log ln n πr lngn,r e πu r ln n πr η here gn,r is given by gn,r = nln 56 πr 57 Proof : Consider any protocol ψ Ψ η. For any given nodes k and l, let A t denote the event that k is able to compute a valid path to l at time t, and let σt denote the probability that A t happens, i.e., Pr[A t ] = σt 58 Since protocol ψ is able to route data packets ith guaranteed delivery ratio of η, then e have lim σtdt η 59 Let α t and α t denote the probabilities that type- and type- errors in i,j s link state information occur at node k at time t, respectively, here node k and node pair i,j are arbitrarily chosen. That is, α t = Pr[Lt =, ˆLt = ] α t = Pr[Lt =, ˆLt 6 = ] Then the posteriori probability that link i, j is don given that the perceived link status at node k is up, denoted by ζt, is given by ζt = Pr[Lt = ˆLt = ] = = Pr[Lt =, ˆLt = ] Pr[Lt =, ˆLt = ] + Pr[Lt =, ˆLt = ] α t α t + πr 6 α t Let α, α and ζ denote the time averages of α t, α t and ζt respectively, i.e., α = lim α tdt α = lim α tdt 6 ζ = lim ζtdt Note that ζt Pr[Lt =, ˆLt = ] = α t and α t Pr[Lt = ] = πr, then it follos from 6 that ζ α 63 α πr 64 Let St denote the hop distance of the actual shortest path from k to l given the precise link state information of the netork. Similarly let Ŝt denote the hop distance of the computed path from k to l Ŝt := if k is unable to compute a path to l. Let F S s := Pr[S > s] denote the complementary cumulative distribution function ccdf of St, and let FŜt s denote the ccdf of Ŝt. Then the probability mass function pmf for Ŝt, denoted by fŝt s}, is given by fŝt s = FŜt s FŜt s, S N. 65 According to Assumption, the probability that the computed path from k to l is a valid path given its hop distance Ŝt = s, denoted by p s t, is given by s p s t = Pr[Lt = ˆLt = ] = ζt s 66 Then the probability σt that k is able to compute a valid path to l at time t is given by σt = n fŝt sp s t s= = ζt s FŜt s FŜt s s= = ζt ζt s FŜt s 67 s= Note that if node k is able to compute a valid path from to l at time t i.e. the event A t happens, then obviously the hop distance of the computed path must be no less than the hop distance of the actual shortest path, i.e. Ŝt St. This fact implies that Pr[Ŝt > s A t] Pr[St > s A t ] 68 According to equation 58 and 68, e have FŜt s Pr[A t ]Pr[Ŝt > s A t] σtpr[st > s A t ] σt F S s Pr[A t ]Pr[St > s A t ] = σt F S s σtf St At s 69 here F St At s = Pr[St > s A t ] is the ccdf of St conditioned on the event A t. Note that S is the hop distance of the shortest path beteen to vertices in a random graph in hich there are n vertices and each of the nn possible edges occurs independently ith probability q := Pr[Lt = ] = πr > n. Then according to Lemma 3 in [, Appendix], the ccdf of S is loer bounded by F S s e gn,r s n πr 7 Notice that the ccdf of St i.e. F S s is time-invariant. This is implied by the fact that St is a stationary process. The stationarity of St can be deduced as follos. St is the hop distance of the shortest path from k to l at time t, hich is determined by the node positions X i t} n i=. Since X i t} are assumed to be stationary and i.i.d., then St must also be a stationary process.

8 It can be deduced from equation 67 and 69 that σt ζtσt ζt s F S s s= +σt σtζt ζt s F St At s 7 s= in hich ζt s F St At s ζt s = ζt ; 7 s= ζt s F H s s= n ln ζt ln gn,r lngn,r lngn,r Γ s= s n πr ds ζt s e gn,r ln ζt Γ, lngn,r ln ζt, lngn,r n πr n πr 73 here Γa,b = x a e x dx is the loer incomplete b Gamma function. It is easy to sho after some algebraic manipulations that ln ζt Γ, ln n πr 74 lngn,r n Combining 7, 7, 73 and 74 e get σt ln n πr ζtσt+σt σ t 75 lngn,r Rearranging 75: ζt lngn,r ln n πr σt σt 76 Since ζt,σt, then } lngn,r ζt min, ln n πr σt σt ln n πr ln n πr σt 77 lngn,r Taking the time average of ζt and then combining ith 59: ln n πr σt ζ lim ln n πr lngn,r dt ln n πr ln n πr lngn,r η 78 Substituting 63 and 64 in 78 e have α α ln n πr ln n πr lngn,r πr η 79 According to Theorem, the bit rate of the minimum routing overhead is no less than Φα,α, i.e., Φη Φα,α 8 Then the result follos directly after substituting 79 and 8 in 5. The next corollary follos directly from Theorem hen Markovian link status changes are assumed. Minimum Rate in Receiving Control Packetsbits/sec.5 x n= n=5 n=.... Delivery Error Ratio η Fig. 4. The minimum rate of receiving control packets vs. delivery error ratio η and the number of nodes in the netork n. Corollary : When the netork is exhibiting Markovian link status changes, the loer bound on the minimum rate in bits/sec at hich a node must receive control packets, hile ensuring that the delivery ratio for data packets be no less than η, is given by Φη nn u log πr ln n πr lngn,r ln n πr η 8 here gn,r is given by equation 57. Fig. 4 shos the plot of the loer bound on Φ against delivery error ratio η and number of nodes n according to 8. It is shon that for large n, the minimum rate at hich a node must receive control packets becomes very high. Moreover, it is observed that there is a linear relationship beteen the loer bound on Φ and the logarithm of η, and Φ can be arbitrarily large ith the decrease of η. This result characterizes the tradeoff beteen the routing overhead incurred by control traffic and the routing efficiency for data traffic. B. Capacity Deficit A ireless ad hoc netork is said to transport one bit-meter hen a bit is transmitted over a distance of one meter [4]. The transport capacity of a netork in bit-meters/sec is defined as the supremum over the set of feasible rate vectors of the distance eighted sum of rates []. The transport capacity is expressed as λnl, here λ is the average arrival rate in bits/sec at the nodes, n is the number of nodes and L is the average distance travelled by the bits. It is shon in [4] that the transport capacity of an arbitrary ireless netork is Θ W na, here n, W and A are the number of nodes deployed, the transmission rate of these nodes and the area over hich the netork is deployed respectively. It is shon in [4] that for a particular interference model knon as the Protocol Model, the upper bound on the transport capacity of an arbitrary ireless netork is given by λnl 8 π W na bit-meters/sec 8

9 here is some constant. Theorem shos that in order to ensure a delivery ratio as high as η, each node must receive control packets at the rate Φη in bits/sec. Since the a control packet received by a node travels at least one hop hich covers a circular area of radius r, the total routing overhead measured in bit-meters/sec is at least nr Φη. This leads to the folloing theorem. Theorem 3: For the Protocol Model, the upper bound on the residual transport capacity available to an arbitrary netork for transmitting data [ λnl ] is given by R [ 8 λnl ]R π W n nr Φη bit-meters/sec 83 Theorem 3 implies that it is impossible to make the delivery error ratio η arbitrarily small, since the transport capacity may be overhelmed by the overhead incurred by control packets. Combining Theorem and 3 lead to the folloing corollary. Corollary 3: For link state routing protocols, a delivery error ratio η is not achievable if it is smaller than some threshold value η. The loer bound on η is given by η lngn,r ln n πr 4 W u π n 3/ +hy +hz n r e πu r 84 The next corollary follos directly hen Markovian link status changes are assumed. Corollary 4: When the netork is exhibiting Markovian link status changes, for link state routing protocols, a delivery error ratio η is not achievable if it is smaller than some threshold value η. The loer bound on η is given by η lngn,r ln n πr πr 4 W u π n 3/ n r 85 Fig. 5 shos the plot of the upper bound on [ λnl ] R against delivery error ratio η according to 83. It is orth noting that any η, [ λnl ] R in the region above the curve cannot be achieved by any link state routing protocol. V. CONCLUSION AND FUTURE WORK In this paper e presented an information-theoretic frameork for analyzing the protocol overhead of link state routing in a mobile ad hoc netork. We formulated the minimum overhead problem as a rate-distortion problem, and then derived loer bounds on the minimum bit-rate at hich a node must receive link state information in order to route data packets ith a guaranteed delivery ratio. This result is then connected ith the results on the transport capacity of multi-hop ireless netorks in [4] in order to characterize the effective capacity left for users. We derive a threshold value for the delivery error ratio, and conclude that no link state routing protocols can guarantee a delivery error ratio smaller than this threshold. Directions of future research may include extending our proposed information-theoretic frameork to a ider range of routing protocols. Developing practical routing schemes that approach to the bounds indicated by the theoretical results could be another option. Upper Bound on Residual Transport Capacity bit meters/sec 5.5 x Unachievable Region for η, [ λnl ] R η.... Delivery Error Ratio η Fig. 5. The upper bound on the residual transport capacity available for transmitting data packets vs. delivery error ratio η. ACKNOWLEDGMENT This ork as funded in part by the National Science Foundation under grants CNS-3956 and CNS REFERENCES [] N. Zhou and A. Abouzeid, Routing in ad hoc netorks: A theoretical frameork ith practical implications, Proc. INFOCOM 5, Mar. 5. [] N. Bisnik and A. Abouzeid, Capacity deificit in mobile irless ad hoc netorks due to geographic routing overhead, Proc. INFOCOM 7, 7. [3] T. M. Cover and J. A. Thomas, Elements of Information Theory, rd ed. John Wiley & Sons, 5. [4] P. Gupta and P. R. Kumar, The capacity of ireless netorks, IEEE Trans. on Information Theory, pages , Mar.. [5] M. Grossglauser and D. N. C. Tse, Mobility increases the capacity of ad hoc ireless netorks, IEEE/ACM Trans. on Netorking, 4,. [6] G. Sharma, R. Mazumdar, and N. Shroff, Delay and capacity tradeoffs in mobile ad hoc netorks: A global perspective, Proc. INFOCOM 6, 6. [7] J. Moy, OSPF version, IETF, RFC 583, Mar., 994. [8] X. Hong, K. Xu and M. Gerla, Scalable routing protocols for mobile ad hoc netorks, IEEE Netork,. [9] A. Iata et al., Scalable routing strategies for ad-hoc ireless netorks, IEEE JSAC, Aug. 999, pp. 369C79. [] G. Pei, M. Gerla, and T. W. Chen, Fisheye state routing: A routing scheme for ad hoc ireless netorks, Proc. ICC, Jun.. [] C. Santivanez, R. Ramanathan, and I. Stavrakakis, Making link-state routing scale for ad hoc netorks, Proc. ACM Intl. Symp. Mobile Ad Hoc Net. Comp., Oct.. [] P. Jacquet et al., Optimized link state routing protocol, draft-ietfmanetolsr-5.txt, Internet Draft, IETF MANET Working Group,. [3] A. Qayyum, L. Viennot, and A. Laouiti, Multipoint relaying: An efficient technique for flooding in mobile ireless netorks, PINRIA res. rep., RR- 3898,. [4] R. G. Ogier et al., Topology broadcast based on reverse-path forarding TBRPF, draft-ietf-manet-tbrpf-5.txt, Internet Draft, IETF MANET Working Group, Mar.. [5] R. G. Gallager, Basic limits on protocol information in data communication netorks, IEEE Trans. on Inf. Theory, 4: , 976. [6] Y. Han, R. J. La, A. M. Makoski and S. Lee, Distribution of path durations in mobile ad-hoc netorks Palm s Theorem to the rescue, Computer Netorks, Volume 5, Issue, Netork Modelling and Simulation, 4 August 6, Pages [7] Q. M. Tran, A. Dadej, and S. Parreau, Characterizing mobility in ad hoc netorks: A generalized approach, in Proc. of QWSN 5, 5. [8] G. Cheng and N. Ansari, Rate-distortion based link state update, Computer Netorks, Volume 5, Issue 7, Dec. 6. [9] S. M. Ross, Stochastic Processes, rd ed. John Wiley & Sons, 996. [] F. Xue, L. L. Xie, and P. R. Kumar, The transport capacity of ireless netorks over fading channels, IEEE Trans. on Inf. Theory, 53, 5. [] D. Wang and A. Abouzeid, Link state routing overhead in mobile ad hoc netorks: a rate distortion formulation, Technical Report, online:

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-9 Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks Kiran Somasundaram Isr develops, applies and

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Scaling Laws of Cognitive Networks

Scaling Laws of Cognitive Networks Scaling Laws of Cognitive Networks Mai Vu, 1 Natasha Devroye, 1, Masoud Sharif, and Vahid Tarokh 1 1 Harvard University, e-mail: maivu, ndevroye, vahid @seas.harvard.edu Boston University, e-mail: sharif@bu.edu

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

Dynamic Resource Allocation for Multi Source-Destination Relay Networks

Dynamic Resource Allocation for Multi Source-Destination Relay Networks Dynamic Resource Allocation for Multi Source-Destination Relay Networks Onur Sahin, Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn, New York, USA Email: osahin0@utopia.poly.edu,

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

Scaling Laws of Cognitive Networks

Scaling Laws of Cognitive Networks Scaling Laws of Cognitive Networks Invited Paper Mai Vu, 1 Natasha Devroye, 1, Masoud Sharif, and Vahid Tarokh 1 1 Harvard University, e-mail: maivu, ndevroye, vahid @seas.harvard.edu Boston University,

More information

On Multi-Server Coded Caching in the Low Memory Regime

On Multi-Server Coded Caching in the Low Memory Regime On Multi-Server Coded Caching in the ow Memory Regime Seyed Pooya Shariatpanahi, Babak Hossein Khalaj School of Computer Science, arxiv:80.07655v [cs.it] 0 Mar 08 Institute for Research in Fundamental

More information

Communications Overhead as the Cost of Constraints

Communications Overhead as the Cost of Constraints Communications Overhead as the Cost of Constraints J. Nicholas Laneman and Brian. Dunn Department of Electrical Engineering University of Notre Dame Email: {jnl,bdunn}@nd.edu Abstract This paper speculates

More information

Lecture 15. Turbo codes make use of a systematic recursive convolutional code and a random permutation, and are encoded by a very simple algorithm:

Lecture 15. Turbo codes make use of a systematic recursive convolutional code and a random permutation, and are encoded by a very simple algorithm: 18.413: Error-Correcting Codes Lab April 6, 2004 Lecturer: Daniel A. Spielman Lecture 15 15.1 Related Reading Fan, pp. 108 110. 15.2 Remarks on Convolutional Codes Most of this lecture ill be devoted to

More information

Content Downloading in Vehicular Networks: What Really Matters

Content Downloading in Vehicular Networks: What Really Matters Content Donloading in Vehicular Netorks: What Really Matters Francesco Malandrino malandrino@tlc.polito.it Claudio Casetti casetti@polito.it Carla-Fabiana Chiasserini chiasserini@polito.it Marco Fiore

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing 2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department

More information

A Deterministic Approach to Throughput Scaling in Wireless Networks

A Deterministic Approach to Throughput Scaling in Wireless Networks A Deterministic Approach to Throughput Scaling in Wireless Networks Sanjeev R. Kulkarni and Pramod Viswanath 1 Nov, 2002 Abstract We address the problem of how throughput in a wireless network scales as

More information

Opportunistic cooperation in wireless ad hoc networks with interference correlation

Opportunistic cooperation in wireless ad hoc networks with interference correlation Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Power Control Algorithm for Providing Packet Error Rate Guarantees in Ad-Hoc Networks

Power Control Algorithm for Providing Packet Error Rate Guarantees in Ad-Hoc Networks Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference 2005 Seville, Spain, December 12-15, 2005 WeC14.5 Power Control Algorithm for Providing Packet Error

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

RECOMMENDATION ITU-R P Attenuation by atmospheric gases

RECOMMENDATION ITU-R P Attenuation by atmospheric gases Rec. ITU-R P.676-6 1 RECOMMENDATION ITU-R P.676-6 Attenuation by atmospheric gases (Question ITU-R 01/3) (1990-199-1995-1997-1999-001-005) The ITU Radiocommunication Assembly, considering a) the necessity

More information

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Proceedings of the World Congress on Engineering 2 Vol II WCE 2, July 6-8, 2, London, U.K. Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Yun Won Chung Abstract Energy

More information

On Event Signal Reconstruction in Wireless Sensor Networks

On Event Signal Reconstruction in Wireless Sensor Networks On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle

More information

Power Controlled Random Access

Power Controlled Random Access 1 Power Controlled Random Access Aditya Dua Department of Electrical Engineering Stanford University Stanford, CA 94305 dua@stanford.edu Abstract The lack of an established infrastructure, and the vagaries

More information

Degrees of Freedom of Bursty Multiple Access Channels with a Relay

Degrees of Freedom of Bursty Multiple Access Channels with a Relay Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department

More information

Delay and Throughput in Random Access Wireless Mesh Networks

Delay and Throughput in Random Access Wireless Mesh Networks Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY 280 bisnin@rpi.edu, abouzeid@ecse.rpi.edu Abstract Wireless mesh

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

A Distributed Power Management Policy for Wireless Ad Hoc Networks

A Distributed Power Management Policy for Wireless Ad Hoc Networks A Distributed Poer Management Policy for ireless Ad Hoc Netorks Carla F. Chiasserini Dipartimento di Elettronica Politecnico di Torino Torino, Italy chiasserini@polito.it Ramesh R. Rao Center for ireless

More information

Activity Pattern Impact of Primary Radio Nodes on Channel Selection Strategies

Activity Pattern Impact of Primary Radio Nodes on Channel Selection Strategies Activity Pattern Impact of Primary Radio Nodes on Channel Selection Strategies Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida To cite this version: Mubashir Husain Rehmani,

More information

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems Research

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information

A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information Jun Zhou Department of Computer Science Florida State University Tallahassee, FL 326 zhou@cs.fsu.edu Xin Yuan

More information

arxiv: v1 [cs.it] 21 Feb 2015

arxiv: v1 [cs.it] 21 Feb 2015 1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical

More information

Framework for Performance Analysis of Channel-aware Wireless Schedulers

Framework for Performance Analysis of Channel-aware Wireless Schedulers Framework for Performance Analysis of Channel-aware Wireless Schedulers Raphael Rom and Hwee Pink Tan Department of Electrical Engineering Technion, Israel Institute of Technology Technion City, Haifa

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

WIRELESS communication channels vary over time

WIRELESS communication channels vary over time 1326 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 Outage Capacities Optimal Power Allocation for Fading Multiple-Access Channels Lifang Li, Nihar Jindal, Member, IEEE, Andrea Goldsmith,

More information

Diversity Gain Region for MIMO Fading Multiple Access Channels

Diversity Gain Region for MIMO Fading Multiple Access Channels Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,

More information

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Xiaobing Wu 1, Jiangchuan Liu 2, Guihai Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China wuxb@dislab.nju.edu.cn,

More information

A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints

A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints D. Torrieri M. C. Valenti S. Talarico U.S. Army Research Laboratory Adelphi, MD West Virginia University Morgantown, WV June, 3 the

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

Cooperative Diversity Routing in Wireless Networks

Cooperative Diversity Routing in Wireless Networks Cooperative Diversity Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networs Siyuan Chen Minsu Huang Yang Li Ying Zhu Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,

More information

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks 2009 First International Conference on Networks & Communications Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks Kiran K. Somasundaram, John S. Baras Institute of Systems Research

More information

A Large-Scale MIMO Precoding Algorithm Based on Iterative Interference Alignment

A Large-Scale MIMO Precoding Algorithm Based on Iterative Interference Alignment BUGARAN ACADEMY OF SCENCES CYBERNETCS AND NFORMATON TECNOOGES Volume 14, No 3 Sofia 014 Print SSN: 1311-970; Online SSN: 1314-4081 DO: 10478/cait-014-0033 A arge-scale MMO Precoding Algorithm Based on

More information

Research Collection. Multi-layer coded direct sequence CDMA. Conference Paper. ETH Library

Research Collection. Multi-layer coded direct sequence CDMA. Conference Paper. ETH Library Research Collection Conference Paper Multi-layer coded direct sequence CDMA Authors: Steiner, Avi; Shamai, Shlomo; Lupu, Valentin; Katz, Uri Publication Date: Permanent Link: https://doi.org/.399/ethz-a-6366

More information

MAXIMUM TRANSMISSION DISTANCE OF GEOGRAPHIC TRANSMISSIONS ON RAYLEIGH CHANNELS

MAXIMUM TRANSMISSION DISTANCE OF GEOGRAPHIC TRANSMISSIONS ON RAYLEIGH CHANNELS MAXIMUM TRANSMISSION DISTANCE OF GEOGRAPHIC TRANSMISSIONS ON RAYLEIGH CHANNELS Tathagata D. Goswami and John M. Shea Wireless Information Networking Group, 458 ENG Building #33 P.O. Box 63 University of

More information

How user throughput depends on the traffic demand in large cellular networks

How user throughput depends on the traffic demand in large cellular networks How user throughput depends on the traffic demand in large cellular networks B. Błaszczyszyn Inria/ENS based on a joint work with M. Jovanovic and M. K. Karray (Orange Labs, Paris) 1st Symposium on Spatial

More information

Cooperative Routing in Wireless Networks

Cooperative Routing in Wireless Networks Cooperative Routing in Wireless Networks Amir Ehsan Khandani Jinane Abounadi Eytan Modiano Lizhong Zheng Laboratory for Information and Decision Systems Massachusetts Institute of Technology 77 Massachusetts

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Bandwidth Scaling in Ultra Wideband Communication 1

Bandwidth Scaling in Ultra Wideband Communication 1 Bandwidth Scaling in Ultra Wideband Communication 1 Dana Porrat dporrat@wireless.stanford.edu David Tse dtse@eecs.berkeley.edu Department of Electrical Engineering and Computer Sciences University of California,

More information

1162 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 4, APRIL 2015

1162 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 4, APRIL 2015 116 IEEE TRANSACTIONS ON COMMUNICATIONS VOL. 63 NO. 4 APRIL 15 Outage Analysis for Coherent Decode-Forward Relaying Over Rayleigh Fading Channels Ahmad Abu Al Haija Student Member IEEE andmaivusenior Member

More information

Fast and efficient randomized flooding on lattice sensor networks

Fast and efficient randomized flooding on lattice sensor networks Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation

More information

Mobility and Fading: Two Sides of the Same Coin

Mobility and Fading: Two Sides of the Same Coin 1 Mobility and Fading: Two Sides of the Same Coin Zhenhua Gong and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {zgong,mhaenggi}@nd.edu Abstract

More information

Providing Wireless Coverage to High-rise Buildings Using UAVs

Providing Wireless Coverage to High-rise Buildings Using UAVs 1 Providing Wireless Coverage to High-rise Buildings Using UAVs Hazim Shakhatreh 1, Abdallah Khreishah 1, and Bo Ji 2 1 Department of Electrical and Computer Engineering, Ne Jersey Institute of Technology

More information

Communication over MIMO X Channel: Signalling and Performance Analysis

Communication over MIMO X Channel: Signalling and Performance Analysis Communication over MIMO X Channel: Signalling and Performance Analysis Mohammad Ali Maddah-Ali, Abolfazl S. Motahari, and Amir K. Khandani Coding & Signal Transmission Laboratory Department of Electrical

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and

More information

A Dynamic Relay Selection Scheme for Mobile Users in Wireless Relay Networks

A Dynamic Relay Selection Scheme for Mobile Users in Wireless Relay Networks A Dynamic Relay Selection Scheme for Mobile Users in Wireless Relay Networks Yifan Li, Ping Wang, Dusit Niyato School of Computer Engineering Nanyang Technological University, Singapore 639798 Email: {LIYI15,

More information

arxiv: v2 [cs.it] 29 Mar 2014

arxiv: v2 [cs.it] 29 Mar 2014 1 Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation Ahmad Abu Al Haija and Mai Vu Abstract arxiv:1312.2169v2 [cs.it] 29 Mar 2014 We propose a time-division uplink

More information

Wireless Network Information Flow

Wireless Network Information Flow Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch

More information

Embedded Orthogonal Space-Time Codes for High Rate and Low Decoding Complexity

Embedded Orthogonal Space-Time Codes for High Rate and Low Decoding Complexity Embedded Orthogonal Space-Time Codes for High Rate and Low Decoding Complexity Mohanned O. Sinnokrot, John R. Barry and Vijay K. Madisetti eorgia Institute of Technology, Atlanta, A 3033 USA, {sinnokrot,

More information

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

Performance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband

Performance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband erformance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband Cheng Luo Muriel Médard Electrical Engineering Electrical Engineering and Computer Science, and Computer Science, Massachusetts

More information

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-8 Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks Kiran K. Somasundaram, John S. Baras Isr develops, applies and teaches

More information

Decentralized Control of Transmission Rates in Energy-Critical Wireless Networks

Decentralized Control of Transmission Rates in Energy-Critical Wireless Networks Decentralized Control of Transmission Rates in Energy-Critical Wireless Networks Li Xia, Member, IEEE, and Basem Shihada Senior Member, IEEE Abstract In this paper, we discuss the decentralized optimization

More information

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,

More information

Two Models for Noisy Feedback in MIMO Channels

Two Models for Noisy Feedback in MIMO Channels Two Models for Noisy Feedback in MIMO Channels Vaneet Aggarwal Princeton University Princeton, NJ 08544 vaggarwa@princeton.edu Gajanana Krishna Stanford University Stanford, CA 94305 gkrishna@stanford.edu

More information

QUALITY OF SERVICE (QoS) is driving research and

QUALITY OF SERVICE (QoS) is driving research and 482 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 3, MARCH 2015 Joint Allocation of Resource Blocks, Power, and Energy-Harvesting Relays in Cellular Networks Sobia Jangsher, Student Member,

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others

More information

Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission

Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission 1 Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission Muhammad Ismail, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, an energy management sub-system

More information

Error Performance of Channel Coding in Random-Access Communication

Error Performance of Channel Coding in Random-Access Communication IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012 3961 Error Performance of Channel Coding in Random-Access Communication Zheng Wang, Student Member, IEEE, andjieluo, Member, IEEE Abstract

More information

Time-Slotted Round-Trip Carrier Synchronization

Time-Slotted Round-Trip Carrier Synchronization Time-Slotted Round-Trip Carrier Synchronization Ipek Ozil and D. Richard Brown III Electrical and Computer Engineering Department Worcester Polytechnic Institute Worcester, MA 01609 email: {ipek,drb}@wpi.edu

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information