The Multicast Capacity of Large Multihop Wireless Networks

Size: px
Start display at page:

Download "The Multicast Capacity of Large Multihop Wireless Networks"

Transcription

1 The Multicast Capacity of Large Multihop Wireless Networks Sriivas Shakkottai Dept. of ECE, ad Coordiated Sciece Laboratory Uiversity of Illiois at Urbaa-Champaig Xi Liu Dept. of Computer Sciece Uiversity of Califoria at Davis Davis, CA R. Srikat Dept. of ECE, ad Coordiated Sciece Laboratory Uiversity of Illiois at Urbaa-Champaig ABSTRACT We cosider wireless ad hoc etworks with a large umber of users. Subsets of users might be iterested i idetical iformatio, ad so we have a regime i which several multicast sessios may coexist. We first calculate a upper-boud o the achievable trasmissio rate per multicast flow as a fuctio of the umber of multicast sources iuch a etwork. We the propose a simple comb-based architecture for multicast routig which achieves the upper boud i a order sese uder certai costraits. Compared to the approach of costructig a Steier tree to decide multicast paths, our costructio achieves the same order-optimal results while requirig little locatio iformatio ad o computatioal overhead. Categories ad Subject Descriptors C.. [Computer-Commuicatio Networks]: Network Architecture ad Desig wireless commuicatio Geeral Terms Theory ad Algorithms Keywords Ad hoc etworks, multicast flows, Steier tree, asymptotic capacity. INTRODUCTION Wireless ad hoc etworks are of use whe there is a lack of fixed commuicatio ifrastructure. Such situatios might arise i calamity eviromets, sesor etwork applicatios, ad a variety of other civilia ad military cotexts. I may applicatios, multicast data trasfer is more predomiat tha uicast data trasfer. I military etworks it is oftetated that multicast traffic domiates due to the ermissio to make digital or hard copies of all or part of this work for persoal or classroom use is grated without fee provided that copies are ot made or distributed for profit or commercial advatage ad that copies bear this otice ad the full citatio o the first page. To copy otherwise, to republish, to post oervers or to redistribute to lists, requires prior specific permissio ad/or a fee. MobiHoc 07, September 9 4, 007, Motréal, Québec, Caada. Copyright 007 ACM /07/ $5.00. eed for group commuicatios. I the civilia cotext, a emergig applicatio that has already bee tested is the use of wireless ad hoc etworks to broadcast replays durig football games. A situatio like a football game would have a large umber of spectators, each havig a mobile device ad a desire for a replay of a importat momet i the game. There is almost o ifrastructure available from which they could obtaiuch data, ad there is a strog icetive to form a ad hoc etwork for this purpose. Some of the users might be close to data sources (perhaps if they were close to a Iteret access poit, ad they would act as sources for the multicast traffic. Other odes would act as relays ad siks for the data. The questios arise as to how may multicast sessios ca be supported by such a etwork, what the total capacity of the etwork would be, ad how to achieve the capacity i a simple ad practical maer. S S 3 3, 3 3,3 3 Figure : Example of multicast flows i a wireless ad hoc etwork. Receivers are labeled with the flows that they are iterested i. Some odes act as pure relays, i which case they are ot labeled. The system throughput is determied by the umber of flows that pass through each ode. Cosider Figure. There is a fiite area with a umber of wireless odes. There are 3 multicast flows i progress, with odes receivig each multicast flow labeled, ad S 3

2 3, respectively. The sources of these flows are labeled as S, S, ad S 3, respectively. The hops are labeled with the sessios that they carry. Some odes may be either sources or destiatios ad merely act as relays (ulabeled odes. Suppose each hop, if scheduled, could carry oe bit per time slot. The first costrait o the system capacity is that we may ot be able to schedule all the hops simultaeously due to iterferece. Eve if all hops could be scheduled simultaeously, we see that the throughput of each source is at most 0.5 bits per time slot i this example, sice all the multicast flows cotai at least oe ode that is shared with oe other multicast flow. The total throughput of the system would the be.5 bits per secod. Thus, we see that there are two maiources of iterferece that limit the multicast capacity of the etwork:. The chael iterferece costrait: While a large trasmissio radius may allow multiple receivers to receive packets from a multicast flow simultaeously, a larger radius meas a trasmittig ode iterferes with more odes, which limits the umber of simultaeous trasmissios. A good multicast structure should balace the tradeoff.. The flow iterferece costrait: if multiple flows pass through the same ode, the rate that each flow obtais is a fractio of the ode s trasmissio capacity. I other words, system capacity is divided amog the flows. Therefore, we cosider the multicast capacity as a fuctio of the umber of multicast sources. I this paper we will study how the throughput of multicast wireless ad hoc etworks scales with the umber of sources, the umber of destiatios per source, ad the total umber of odes preset i the system. We will cocetrate o the case whe the umber of odes i the system is large. We cosider a uit square i which odes are dropped at radom, of these odes are radomly chose as sources, ad each of these sources is associated with d radom destiatios, makig a total of d source-destiatio pairs i the system. We would like to uderstad the throughput scalig laws i the etwork as,, d. We assume that log d / 0 as, d. There are a umber of studies that cosider such questios with regard to uicast flows, startig with the semial paper by Gupta ad Kumar [], where achievable upper bouds are derived for wireless ad hoc etworks i a fiite regio with a large umber of odes. The Gupta-Kumar result was re-derived i a much simpler maer i []. Related ideas ca also be foud i [3,4]. A umber of papers have also looked at delay-throughput tradeoffs i mobile models for such etworks [4 8], although we do ot study this issue i our paper. Multicast i wireless etworks has beetudied i [9,0], but these papers do ot deal with scalig laws. Some examples of multicast protocols are preseted i [ 3]. I compariso, our focus i this paper is ot to develop a protocol, but to show that a simple routig structure ca be capacity achievig i a order-optimal sese. To the best of our kowledge, the oly prior works that deals with scalig laws i wireless etworks with multicast flows are [4, 8]. However, they use a Steier tree approach to costruct a multicast tree, ad they assume that every ode i the etwork is a multicast source. Our mai cotributio is to propose a simple architecture that achieves the same capacity i the order sese. Furthermore, our proof of the upperboud is differet from that i [4,8]. Last, we cosider the scalig law as a fuctio of the umber of multicast sources. Mai Results We express our results i the order sese. We say f( O(g( with high probability (w.h.p if give δ > 0, c, ad m(δ such that {f( c g(} δ m(δ. Similarly, we say f( Θ(g( with high probability (w.h.p if give δ > 0, c, c, ad m(δ such that {c g( f( c g(} δ m(δ. We first derive a upper boud o the multicast capacity of a wireless ad hoc etwork. The mai techical challege is to take ito accout the broadcast ature of wireless media where multiple odes ca receive simultaeously. We show that the upper boud o the sum of the source rates that the etwork caupport is «O w.h.p, d log with a per flow throughput capacity of «O w.h.p. d log The achievability of the upper boud is the mai cotributio of this paper. To achieve the upper boud, we propose a simple routig architecture to trasfer multicast data i the etwork. The architecture cosists of a tree called the multicast comb, which is costructed idepedet of the receiver locatios. The receivers the complete the multicast tree by attachig themselves to the comb usig shortest path routig i a small viciity. Usig this simple architecture, we show that the achievable throughput matches the upper boud i a order sese if d = Ω( log ; it is allowed to drop a arbitrarily small fractio of traffic; or 3 oe ca pose costraits o the locatios of the source ad destiatio odes. I compariso, whe there are d uicast source-destiatio pairs, the per flow throughput capacity for uicast is «Θ w.h.p. d log followig the Gupta-Kumar result. Therefore, by exploitig the properties of multicast, oe ca obtai multicast gai of for relatively large d. Θ( d Orgaizatio of the aper We begi i Sectio with a descriptio of the system model that we cosider. We derive the upper boud o multicast capacity ad compare it to the uicast upper boud i Sectio 3. We the proceed i Sectio 4 to desig a simple architecture that we call the multicast comb structure that achieves the upper boud i the order sese if the sources ad destiatios ca be choseuitably. However, sice our goal is to study the case of radomly choseources ad destiatios, i Sectio 5 we fid the lower boud o the achievable trasmissio rate. We coclude with possible extesios i Sectio 6.

3 . SYSTEM MODEL We cosider a square of uit area, i which wireless odes are located radomly. There are multicast sources chose radomly from the odes, ad each of these sources is associated with d destiatio odes also chose radomly. Thus, the total umber source-destiatio pairs is d. We use the protocol model to model iterferece betwee trasmissios, as proposed i []. The model is illustrated i Figure. We assume that all odes choose idetical trasmit radii r, which is large eough for the etwork to be coected. Suppose that ode i trasmits to ode j. Node j receives the trasmissiouccessfully if every other ode that trasmits simultaeously is at a distace of at least (+ r from j. This implies that circles of radius r aroud each receiver must be disjoit []. A ode ca trasmit bit of data per uit of time if its trasmissio is successful. T (+ r R r Figure : Illustratio of the protocol model for wireless trasmissio. The assumptio is that a trasmissio would be successful as log as there is o other trasmissio i a circle of radius (+ r from the iteded receiver. Whe = ad d = the model is the same as a uicast problem with Θ( sources. Whe = ad d = the source ca broadcast its data i oe hop to all the destiatios with a trasmissio radius of. We would like to uderstad the capacity scalig law ad its practical achievability betwee these two extremes. I particular, we study the case where d = ǫ, ad 0 < ǫ <. I this paper, a multicast tree refers to a trasmissio structure that takes ito accout the broadcast ature of the wireless medium, which is differet from a miimum spaig tree. The differece is show i Figure. I the figure, A is the multicast source with B ad C as its receivers. The left figure shows a Steier tree i a wired etwork, where R is a relay ode. I this case, A trasmits oce to R, ad R trasmits to B ad C, respectively. The right figure shows a multicast tree i a wireless etwork where B ad C ca receive A s trasmissioimultaeously (i.e., oly oe trasmissio is eeded. The legth of the wireless multicast tree is larger tha or equal to that of the miimum Steier tree while the umber of trasmissios may be smaller. Therefore, takig ito accout such a effect is critical to derivig B R A a A miimum Steier tree C B R A C b A (wireless multicast tree Figure 3: A multicast tree i a wireless etwork. a upperboud ad to decidig the optimal trasmissio scheme for multicast i wireless etworks. I a multicast tree, all leaf odes are multicast receivers. 3. UER BOUND Our first objective is to derive a upper boud o the throughput capacity of multicast wireless etworks. We have the followig theorem. Theorem. The throughput of each multicast source i a radom wireless ad-hoc etwork is upper bouded by ««O mi, w.h.p. d log as, d = ǫ, 0 < ǫ <, ad is a fuctio of satisfyig where as. log d lim = 0, To proof this theorem, we still exploit the idea that commuicatios cosume space as i [, 4]. However, the focus is to take ito accout the properties of multicast. The questios that eed to be aswered to obtai a useful boud o the throughput capacity are: (i what should the radius r be?, ad (ii what is the umber of trasmissios required to reach all destiatios? It has beehow i [] that the miimum trasmissio radius r mi has to be choseuch that r log + κ r mi = (where lim sup κ < + to guaratee coectivity of odes with high probability. Therefore, we assume that the trasmissio radius r r mi i the rest of the paper. A remaiig questio is whether or ot a larger commuicatio rage is beeficial for multicast flows to take advatage of the broadcastig ature of wireless media, which will be addressed i the proof of the theorem. Whe we have the aswer to the above two related questios, we ca derive the upperboud for capacity as follows. Let the trasmissio radius be r, sice our square is of size, the maximum umber of simultaeous trasmissios ca be bouded [] as S π ` r = 4 π r. ( Whe there are multicast flows ad each requires at least H i(r trasmissios, i, the capacity of a multicast

4 Circle II Circle I Note that there will be o ifiite loops because we reduce the umber of odes i the tree by at least i each step. To elaborate, before the process, A has at least 3 childre. We removed at least 3 childre odes ad added oly odes. A We ow eed the followig results from [5, 6] for the legth of the multicast tree i radom etworks. Result Suppose we drop m odes i a uit square, where the positio of each ode is chose uiformly at radom i the square. The as m the legth of the miimum spaig tree L(m satisfies. E(L(m C m (Lemma 3.3 from [6], ad. V ar(l(m C log m (Lemma 4. from [6], flow satisfies Figure 4: New tree costructio. 4 λ π r ( i Hi(r. To prove the theorem, we first preset two lemmas. The first lemma is o the degree of multicast trees. The secod lemma is o the legth of multicast trees. Lemma. For a give multicast tree, oe ca costruct a correspodig multicast tree such that each ode has at most twelve childre odes that trasmit; ad the total umber of trasmissios is smaller tha or equal to that of the origial tree. roof. Cosider a multicast tree. First, we remove all leaf odes sice the two costraits do ot cocer leaf odes. I other words, i the rest of the proof, the degree of a ode does ot cout the leaf odes. If all remaiig odes i the origial tree have at most twelve childre odes, the the ew tree equals to origial tree. If ot, we eed to costruct a alterative tree that has a bouded degree of twelve ad a smaller umber of trasmissios compared to the origial tree T. The idea is show i Figure 4 ad discussed i the followig. Assume that the trasmit childre degree of ode A is greater or equal to 3 (i.e., ode A has at least 3 childre odes that eed to trasmit. The all receivers of its childre are withi Circle II (red. Assume we ca arbitrarily add relay odes. We add 6 square (blue oes ad 6 triagle (yellow oes. Replace Node A s trasmit childre odes by the ew odes. Node A plus these ew odes will cover all receivers i the origial tree that are covered by ode A ad its childre. The umber of total trasmissios is reduced to 3. To maitai the tree structure, A is the paret of all 6 square odes ad all leaf odes i Circle I i the origial tree. Oe square ode is the paret of oe triagle ode; ad all leaf odes betwee Circle II ad Circle I o the origial tree ca be coected to oe of the square odes. The ew tree has a bouded degree at ode A ad a smaller umber of trasmissios. Followig the same procedure to replace all odes with degree larger tha. The the fial tree has a maximum degree of. where C ad C are positive costats, ad the otatio is used to deote asymptotic equality. Also, the legth of the optimal Euclidea Steier tree coectig all the m odes S(m 3 L(m [5]. We ext preset a upper boud o the legth of multicast trees. Let M i( d be the legth of a multicast tree associated with source i. Lemma. The average legth of a multicast tree is Ω( d w.h.p.; i.e., ( X s M i( d > C d, (3 i= where C is a positive costat, whe log d lim = 0. roof. Let L i( d be the legth of the miimum spaig tree, ad S i( d be the legth of its Steier tree. We ca lower boud the total legth X i= X M i( d S i( d ( X 3/ L i( d, i= where ( follows from Result. Now, X L i( d E(L i( d ( δ i= ( V ar(li( d δ ( C log d δ 0 as, where ( follows from Chebyshev s iequality ad the i.i.d ature of the multicast trees, ad ( follows from Result. Also we have used the hypothesis that log d / 0 as. Thus, as, X L i( d ( i= ( s X i= E(L i( d < δ L i( d > E(L i( d δ i=.

5 Now, from Result, C, such that E(L i( d δ C d for large d. Hece, we have ( X s i= ( s X i= ( s X i= M i( d L i( d L i( d > C d > C d > E(L i( d δ Now we are ready to prove Theorem.. roof. Cosider (. We eed the trasmissio radius r ad the miimum umber of trasmissios i Hi(r. We cosider two situatios: Case : r = o(/ d. Give the trasmissio radius is r, we eed to obtai the miimum umber of total trasmissios eeded, i Hi(r, where Hi(r is the umber of trasmissios for multicast group i. Cosider a multicast tree for source i. Followig Lemma, we ca costruct a ew tree, T, that has bouded degree ad a smaller umber of trasmissios, deoted as H i(r. Let M i( d be the legth of T associated with source i. Followig Lemma, we have ( X s M i( d > C d. (5 i= I the tree T, there are at most d leaf odes i the tree. The legth to each leaf ode is at most r. Remove all leaf odes ad the legth of remaiig tree is Ω( d d r = Ω( d w.h.p. Each ode has at most K childre odes trasmittig, ad thus each trasmissio cotributes to at most Kr i terms of distace to the remaiig tree. Therefore, the miimum umber of trasmissios eeded satisfies: ( s X i= H i(r > C d, Kr where C is a costat ad C C. Because H i(r H i(r, usig the relatio (, we have λ (4 κ r d, w.h.p. (6 where κ is costat. I additio, by the capacity limit o each ode, we have λ. It is clear that the RHS of Eq. (6 is a decreasig fuctio of r. Therefore, upoubstitutig the miimum value of r to maitai coectivity, we have λ mi, d log «, w.h.p. (7 Case : r = Ω(/ d. I this case, similar to the proof i [8], we divide the area ito squares of size r. There are /r such squares. There exists a costat fractio of such squares that have at least oe multicast receiver. Oe trasmissio ca reach at most 9 eighborig squares. Therefore, we eed at least c /r trasmissios, where c is a costat. The umber of simultaeous trasmissios i the etwork is Θ(/r. Therefore, followig Eq. (, we have «κ λ mi,, where κ is a costat. I the case where d = ǫ, where 0 < ǫ <, we have d log. Combied with Eq. (7, the theorem follows. I order to cotrast the multicast case with the uicast case, we take the umber of source destiatio pairs to be the same i both cases. This would eable us to characterize the gai that could potetially be achieved usig multicast. Sice the uicast regime cosists of ource destiatio pairs, we take d =. I particular, we take d = ǫ ad = ǫ, where 0 ǫ. We have the followig corollary: Corollary. The throughput of each multicast source i a radom wireless ad hoc etwork is upper bouded by! Θ p w.h.p. ǫ log Notice that as ǫ 0, the multicast throughput capacity is essetially the same as the uicast capacity as it should be. Also otice that as ǫ, the beefit of usig multicast is lost sice all odes could be reached by oe broadcast hop. As a example, cosider the case where = 0, 000 ad ǫ = / (i.e., there are 00 sources, each with 00 destiatios. The per-source throughput that ca achieved by usig multicast is 0 times that of uicast. We ow move to the problem of desigig a simple schedulig ad routig algorithm that could be used to implemet the multicast idea. We first show that i a etwork where we are allowed to choose the sources ad destiatio, the multicast capacity ca easily be attaied. We the cosider the case of radomly choseources ad destiatios. 4. ORDER OTIMAL COMB STRUCTURE We develop a simple architecture, whereby we may achieve the upper boud foud above (i the order sese, whe we are allowed to select the source ad destiatio odes appropriately while still keepig the average distace from a multicast source to its destiatios a costat. This locatio costrait is itroduced here to simplify the discussio ad highlight the comb structure. We will remove the assumptio i Sectio 5. As before, we study the system with multicast sources each with d destiatios. The mai features of our costructio are as follows. We first divide the regio ito squarelets i the maer of []. The squarelet size is large eough so that there is at least oe ode i each squarelet with high probability, ad odes i adjacet squarelets are capable of commuicatig with each other. Let the legth of a squarelet be s.

6 The schedulig algorithm will be choseuch that the squarelets that are Ks apart are scheduled simultaeously, where K is choseuch that the wireless iterferece costrait is satisfied. We costruct multicast comb structures usig the costructed squarelets. There is oe comb correspodig to each multicast flow. The combs are costructed so that at most flows pass through a squarelet, i order keep iterferece betwee flows miimal. I the comb structure, the width betwee two cosecutive comb teeth is determied by d, the umber of destiatios per multicast source. Each multicast destiatio ode ca reach ay oe tooth o the comb to receive multicast data. This ca be doe i the viciity of the destiatio ode usig ay routig algorithms, such as shortest path routig. To costruct the comb, the locatio of the destiatio odes is ot required ad o cetral cotrol is eeded. I additio, the cost of the comb structure is the same as a optimal Steier tree i a order sese. We ow preset the details of the architecture ad derive its throughput capacity. Recall that the legth of a squarelet is s. We have the followig useful result from []: Result For a squarelet size 3 log s =, o squarelet is empty with probability at least. We eed to esure that a ode i oe corer of a squarelet ca trasmit to a ode i the opposite corer of a adjacet squarelet, i.e., the trasmissio radius is chose as r = 5s. We ca guaratee successful receptio at a receivig ode, if o other trasmissio takes place withi a distace of 5s ( +. Recall that Ks is the distace such that squarelets that are this distace apart ca be scheduled simultaeously. The, as illustrated i Figure 5, we have (K s ( + 5s K = + ( + 5. We call the subset of squarelets a distace of K squarelets from each other, capable of simultaeous trasmissio as a equivalece class. So the umber of such equivalece classes is K. We the have a system i which the periodicity with which ay squarelet is scheduled is K time slots. Usig the above idea, we costruct the followig comb structure for multicast traffic. Suppose that we are able to select the source ad receiver odes of the multicast. We first costruct multiple combs, oe for each multicast flow as show i Figure 6. I the figure we have illustrated two multicast combs (oe lightly shaded (cya, ad the other dark (mageta correspodig to two multicast flows. The distace betwee the teeth of each comb is chose to be d. The Euclidea legth of comb routig for a particular multicast comb is d + = Θ( d. (8 From Result, we have that the Euclidea legth of the optimal Steier tree is Θ( d, which is the same as our comb structure i a order sese. The costructio of the Ks s S Figure 5: Illustratio of schedulig costraits with = 0.5. The source is i the squarelet labeled S, ad the squarelet with the X is where the receiver is located. K is choseo that all possible receiver odes i this squarelet are guarateed successful receptio. Steier tree requires global locatio iformatio ad a cetralized cotroller. I compariso, the costructio of the comb structure oly requires iformatio o the umber of destiatio odes ad does ot require a cetral cotroller to compute the tree. Each comb is positioed oe squarelet farther to the right ad below to the previous oe. Note that by usig this structure, we have esured that the maximum umber of multicast flows that use ay particular squarelet is. Sice each squarelet is scheduled with a periodicity of K slots ad the chael has a capacity of bit per time slot (if scheduled, if oly multicast flows share a squarelet, their idividual throughput would be /K bits per time slot. Sice we ca choose the locatios of the source ad destiatio odes as desired, we let the source ad destiatios of a particular multicast flow lie o its correspodig comb. The average distace of a source ad its destiatios is still Θ(. For example, i Figure 6, the sources ad destiatios associated with the lightly shaded (cya comb would lie somewhere o the comb. As the distace betwee the teeth of a comb is d, the umber of such combs that ca be costructed is s d. I other words, sice s = 3 log /, the proposed system ca accommodate a total of 3d log sources without usig oe comb for multiple flows. As explaied above, sice there are a maximum of flows usig each squarelet, the sources ca each trasmit at a rate of (9

7 d Figure 6: The comb idea for multicast data trasfer. Each comb carries a data from a differet source. The size of the squarelet places a fudametal limit o the umber of possible coexistet combs. /K. This results i a total source rate of K 3 d log, (0 which is of the same order of magitude as the upper boud calculated i the previous sectio. If > / 3 d log, the each comb is reused over multiple multicast sources. For example, if the umber of sources were set to be = ǫ ad d = ǫ, each comb would give each source a throughput of K p 3 ǫ log, which is of the same order as the per flow throughput of the previous sectio (See Corollary. Notice that i this scheme, the throughput of the system icreases with the umber of multicast sources at a costat rate util = ǫ 3 log. After this poit, the aggregated source rate remais costat as show i Figure 7, for a give value of d. We have proposed a simple multicast architecture, ad show that its throughput i ideal circumstaces is idetical (i the order sese to the upper boud. However, we have yet to study its performace whe we are ot at liberty to place the sources ad destiatios. We proceed to aswer this questio i the followig sectio. 5. ACHIEVABLE MULTICAST CAACITY IN RANDOM NETWORKS We have just see how the comb architecture is capacityachievig i the case where source-destiatio placemets ca be made as desired. We will ow study the case where the sources ad destiatios are radomly chose. I this case the both sources ad destiatios must reach the comb i a multi-hop maer. Oce they reach the comb, they would have access to the multicast traffic o that comb. The limitig factor is that as the umber of such access paths icrease, the load of each squarelet does as well, leadig to reductio of throughput for the flows passig through the squarelet. I this sectio, we will study this effect. We will show that there exists two regimes. I the first regime, whe ad d are relatively large, all squarelets have the same amout of load asymptotically. I this regio, comb structure achieves the order optimal per-flow throughput. I the secod regime, whe ad d are relatively small, there are regios i which the traffic load is much larger tha that of the average. Therefore, to guaratee the same throughput for each flow, per flow throughput suffers. O the other had, we will thehow that the umber of such regios is a small percetage of the whole, ad we ca a arbitrarily small percetage of traffic to achieve order optimal throughput for the remaiig odes. I both regimes, the aggregated receive rate of the multicast flows is order optimal. d λ 3 log Figure 7: The upper boud for multicast usig the comb method. We see that the boud icreases liearly with the umber of multicast sources as the comb gets filled. The throughput capacity is costat afterward. Figure 8: Usig the comb method for radomly placed sources ad destiatios. A source would be assiged a comb ad would coect to the closest possible tooth. Destiatios would do likewise. Recall that i the previous sectio we showed that the capacity achievig umber of sources was = / 3 d log with each source associated with d destiatios. Also recall that if the umber of sources is greater tha this value,

8 we have comb reuse with the total capacity remaiig costat. We idex the co-existig combs of Figure 6 from to s d = / 3 d log. We associate each source with oe of the combs. Whe there are more sources, the they evely share the combs. For a give multicast flow, both the source ad its destiatios choose the shortest path to reach the closest tooth o the chose comb. As show i Figure 8, these paths are simple to costruct (they are either above or below the teeth. Note that the maximum legth of the path is d, which meas that the icrease i legth of the multicast tree due to these brach paths would be just d d = Θ( d. Thus, comparig with (8, we see that Euclidea legth of the tree is uaffected i the order sese by the brach paths. 5. Capacity-achievig Regio Theorem 3. Whe d = Ω( log, the comb scheme is order optimal for each flow. I other words, the comb scheme eables per flow throughput of «Θ w.h.p. d log for all flows. roof. Cosider Figure 9. Sice both sources ad destiatios of a particular multicast flow would use the shortest vertical path to coect to the relevat comb, we ca divide the area ito bis associated with a particular flow. Let l be the umber of squarelets i a bi. We have l = /( d /s. We have idicated a few bis usig arrows i the Figure 9. The width of a bi is the width of a squarelet. d Figure 9: The umber of available bis for droppig odes whe cosiderig a particular source. The arrows show the extet of a few bis associated with the comb. Cosider a squarelet. There would be a umber of braches passig through this squarelet, where each brach is a path take by some ode to reach its desired comb tooth. Let X k be the umber of braches passig through squarelet k. The value of X k decides the crowdedess. Let X ij be a radom variable, where X ij = 0 if squarelet j cotais o source or destiatio ode of multicast stream i ad X ij = otherwise. Let p = (X ij =, where p = ( s d+. I other words, X ij = j with probability p 0 with probability p, Let Br ij be the set of squarelets through which the brach for ode j to source i pass. X k = X X X ij i= k Br ij X s l m= X m, where X m has the same distributio as X ij ad is i.i.d. The iequality holds because a brach has at most l squarelets. Let ρ be the average load o a ode if source/destiatios are evely distributed. We have ρ = p l/ + s s d. The first term is the load o the squarelet from the radom braches ad the secod is the load due to evely distributed comb structure. The two terms are o the same order. Because the secod term is determiistic ad the same for all squarelet, we remove it from the followig discussios for simplicity. I particular, we focus o ρ = Θ(ρ, which deotes the average load due to radom braches. ρ = p l/. Giveome W R + ad usig the Cheroff boud, we have E e Xk (X k Wρ. e Wρ We calculate E `e X ext as follows:! E e Xk Xl k p k ( p sl k e k l Therefore, i=0 = ( + (e p sl (X W max(ρ, ( ( + (e psl e W max(ρ, esl(e p e W max(ρ, = e(e ρ e W max(ρ, e (e W max(ρ,. ( By the hypothesis d = Ω( log, we have d k log, where k is a costat, for large eough. Recall that p = ( s d+. Because d = ǫ, where ǫ <, we have p c d s for a costat c ad large eough. I this case, ρ c d ls k log. Let W = e + /k. We have (X k W max(ρ, = (X k Wρ. There are /3log quarelets. Use a uio boud, we have (max X k Wρ k 3 log (Xk Wρ.

9 Therefore, the load of each squarelet is at most a costat factor of that of the average w.h.p. The throughput of each flow is thus ««λ = Θ = Θ. ρ d log Compared with Theorem, the comb scheme is order optimal for each flow. 5. Whe ad d are small Theorem 3 shows that if ad d are relatively large, the comb scheme is order optimal for each flow. We ow cosider the case where ad d are relatively small. We have the followig theorem: Theorem 4. Whe d = o( log, the comb scheme is order optimal withi a factor of O(log for each flow. I other words, the comb scheme eables per flow throughput of Ω for all flows. log mi, d log ««w.h.p. roof. Cosider squarelet k. Let X k be the load of squarelet k. Followig Eq. ( i the proof of Theorem 3, we have (X k W max(ρ, e (e W max(ρ,. ( Let W = 3 log. For large eough, we have (max k (Xk W max(ρ,. where we use a uio boud. Therefore, the throughput of each flow is «λ = Ω W max(ρ, ««= Ω log mi, w.h.p. (3 d log Compared with Theorem, the comb scheme has a loss factor of at most log(. The proof idicates that there are certaiquarelets that have a large umber of iterferig flows compared to the average, causig a loss of throughput. But how may squarelets would actually have such overcrowdig? If the fractio of overcrowded squarelets were small, the we could simply drop the destiatios belogig to these squarelets. Thus, we propose to use a majority rule, which ca provide a high multicast rate (o the same order of the capacity upper boud to a majority of users if we are allowed to sacrifice a arbitrarily small percetage of users i overcrowded areas. We show below that a ode ca achieve order optimal throughput with a probability of at least th, which is a costat, but ca be set arbitrarily close to. Theorem 5. Give ay threshold th > 0, with probability at least th, a ode ca receive the order optimal per flow throughput capacity usig the comb structure by droppig a small percetage of traffic. roof. The basic idea of the proof is as follows. We divide the etwork ito disjoit bis. Each bi has l squarelets. A brach may fall ito at most two disjoit bis. We say a bi is cogested if the most cogested squarelet i the bi has more tha W times of the average load, where W is a costat that is to be determied later. The traffic to/from a ode may be dropped if the ode s brach overlaps with a cogested bi. A ode ca receive the order optimal throughput if its brach does ot overlap with cogested bis ad either does its source ode. We will show that this probability is at least th. Next, we calculate the probability that a bi is cogested. Cosider a bi. Let Y be the umber of source ad destiatio odes whose traffic may use some squarelets of the bi. These source/destiatio odes could belog to differet multicast flows. Recall that X ij = is the evet that squarelet i cotais at least a ode associated with multicast flow j, where p = ( s d+. Let ρ be the average load of a squarelet as before. Note that odes i at most 3l squarelets ca cotribute to the traffic i a give bi of legth l. Therefore, we have Y 3l X s m= X m where X m has the same distributio as X ij ad is i.i.d. Note that Y upper bouds the load of the most cogested squarelet i the bi. Followig the proof of Theorem 3, we cahow that Let Let We have (Y W max(ρ, e (e W max(ρ,. (4 ( th 4 = th. W = e + l. th (Y W max(ρ, (e W max(ρ, e e (e W = th. I other words, with probability th, a bi is ot cogested. Recall that a ode may at most belog to two bis. Therefore, with probability at least ( th 4, the braches of a destiatio ode ad its source ode do ot to a cogested bi, ad thus ca receive order optimal throughput. We have thus show that by droppig a arbitrarily small fractio of the traffic, we ca achieve order optimal throughput for the rest of the odes. Note that as th approaches 0, the per-source throughput also approaches zero. However, the rate of decrease is slow: it is proportioal to the logarithm of / th. This kid of policy would be acceptable i real situatios where it is importat that most of the users obtai high rate trasmissio, rather tha havig to cut dow the rate for all users so as to satisfy a small percetage of overcrowded areas. We also ote that if a source ode passes a cogested area, it is ituitive to let the source ode trasmit first i the area. However, there exists a probability (take ito accout i th through the calculatio of p that multiple source odes cogest a bi. I this case, all receivers i

10 these multicast groups suffer. Noetheless, this probability is take ito accout i th. Thus, the statemet still holds. Next, we preset a geeral result o the aggregated multicast capacity for all ad d. Theorem 6. The comb scheme achieves order optimal aggregated multicast capacity. I other words, the comb scheme eables the total receivig rate of Θ mi d, ««d log w.h.p. roof. Followig Theorem 3, whe d = Ω( log, the comb scheme achieves the optimal throughput for each flow. Therefore, it also achieves the optimal aggregated throughput. O the other had, whe is small, followig Theorem 5, a ode achieves a order optimal throughput with probability th. So the aggregated receivig rate is at least that of th of the optimal throughput, ad thus order optimal. 6. CONCLUSIONS I this paper we have developed a aalytical framework for studyig the multicast capacity of wireless ad hoc etworks. We started with a compariso of the uicast case that has beetudied i detail earlier, ad showed how the multicast capacity is a fuctio of the umber of multicast sources ad destiatios. We developed a ew ad simple scheme that we called the comb architecture that would achieve this upper boud if we were at liberty to place the sources ad destiatios. We also studied the radom etwork case ad showed that the price paid i terms of throughput capacity for the simple ad robust architecture is ot high i the order sese. I the future we would like to study experimetal wireless multicast etworks. 7. REFERENCES []. Gupta ad. R. Kumar, The capacity of wireless etworks, IEEE Trasactios o Iformatio Theory, vol. IT-46, o., pp , March 000. [] S. R. Kulkari ad. Viswaath, A determiistic approach to throughput scalig i wireless etworks, IEEE Trasactios o Iformatio Theory, vol. 50, o. 6, pp , 004. [3] S. Toumpis ad A. J. Goldsmith, Large Wireless Networks uder Fadig, Mobility, ad Delay Costraits, i roceedigs of IEEE INFOCOM 004, Hog Kog, March 004. [4] A. E. Gamal, J. Mamme, B. rabhakar, ad D. Shah, Throughput-Delay Trade-off i Wireless Networks, i roceedigs of IEEE INFOCOM 004, Hog Kog, March 004. [5] M. Grossglauser ad D. Tse, Mobility Icreases the Capacity of Adhoc Wireless Networks, IEEE/ACM Trasactios o Networkig, vol. 0, o. 4, pp , August 00. [6] X. Li ad N. B. Shroff, Towards Achievig the Maximum Capacity i Large Mobile Wireless Networks, Joural of Commuicatios ad Networks, Special Issue o Mobile Ad Hoc Wireless Networks, vol. 6, o. 4, December 004. [7] M. J. Neely ad E. Modiao, Capacity ad Delay Tradeoffs for Ad-Hoc Mobile Networks, IEEE Trasactios o Iformatio Theory, vol. 5, o. 6, pp , Jue 005. [8] G. Sharma, R. R. Mazumdar, ad N. B. Shroff, Delay ad Capacity Trade-offs i Mobile Ad Hoc Networks: A Global erspective, i roceedigs of IEEE INFOCOM 006, Barceloa, Spai, April 006. [9] J. E. Wieselthier, G. D. Nguye, ad A. Ephremides, O the Costructio of Eergy-Efficiet Broadcast ad Multicast Trees i Wireless Networks, i roceedigs of IEEE INFOCOM 000, Tel-Aviv, Israel, March 000. [0].Chaporkar ad S. Sarkar, Wireless Multicast: Theory ad Approaches, IEEE Trasactios o Iformatio Theory, vol. 5, o. 6, pp , Jue 005. [] E. M. Royer ad C. E. erkis, Multicast Operatio of the Ad Hoc O-Demad Distace Vector Routig rotocol, i roceedigs of the 5th aual ACM/IEEE Iteratioal Coferece o Mobile Computig ad Networkig (Mobicom, Seattle, WA, August 999. []. Siha, R. Sivakumar, ad V. Bharghava, MCEDAR: Multicast Core-Extractio Distributed Ad Hoc Routig, i roceedigs of the Wireless Commuicatios ad Networkig Coferece (WCNC, New Orleas, LA, September 999. [3] S.-J. Lee, M. Gerla, ad C.-C. Chiag, O-Demad Multicast Routig rotocol, i roceedigs of the Wireless Commuicatios ad Networkig Coferece (WCNC, New Orleas, LA, September 999. [4]. Jacquet ad G. Rodolakis, Multicast scalig properties i massively dese ad hoc etworks, i ICADS 05: roceedigs of the th Iteratioal Coferece o arallel ad Distributed Systems - Workshops (ICADS 05. Washigto, DC, USA: IEEE Computer Society, 005, pp [5] D. Z. Du ad F. K. Hwag, A proof of the Gilbert-ollak s cojucture o the Steier ratio, Algorithmica, o. 45, pp. 35, 99. [6] M. Steele, Growth rates of Euclidea miimal spaig trees with power weighted edges, The Aals of robability, vol., o. 6, pp , 988. [7] R. Motwai ad. Raghava, Radomized Algorithms. Cambridge Uiversity ress, Cambridge, UK, 995. [8] X. Li, S. Tag ad O. Frieder, Multicast Capacity of Large Scale Wireless Ad Hoc Networks i ACM MobiCom 007.

The Multicast Capacity of Large Multihop Wireless Networks

The Multicast Capacity of Large Multihop Wireless Networks The Multicast Capacity of Large Multihop Wireless Networks Sriivas Shakkottai Dept. of ECE, ad Coordiated Sciece Laboratory Uiversity of Illiois at Urbaa-Champaig sshakkot@uiuc.edu Xi Liu Dept. of Computer

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

Broadcast Capacity in Multihop Wireless Networks

Broadcast Capacity in Multihop Wireless Networks Broadcast Capacity i Multihop ireless Networks Alireza Keshavarz- Haddad alireza@rice.edu Viay Ribeiro viay@rice.edu Rudolf Riedi riedi@rice.edu Departmet of Electrical ad Computer Egieerig ad Departmet

More information

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks The Throughput ad Delay Trade-off of Wireless Ad-hoc Networks. Itroductio I this report, we summarize the papers by Gupta ad Kumar [GK2000], Grossglauser ad Tse [GT2002], Gamal, Mame, Prabhakar, ad hah

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Reception

Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Reception Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Receptio Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Network Coding Does Not Change The Multicast Throughput Order of Wireless Ad Hoc Networks

Network Coding Does Not Change The Multicast Throughput Order of Wireless Ad Hoc Networks Network Codig Does Not Chage The Multicast Throughput Order of Wireless Ad Hoc Networks Shirish Karade, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer

More information

Capacity of Interference-limited Three Dimensional CSMA Networks

Capacity of Interference-limited Three Dimensional CSMA Networks Capacity of Iterferece-limited Three Dimesioal CSMA Networks Tao Yag, Guoqiag Mao School of Electrical ad Iformatio Egieerig The Uiversity of Sydey Email: {tao.yag, guoqiag.mao}@sydey.edu.au Wei Zhag School

More information

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks O the Delay Performace of I-etwork Aggregatio i Lossy Wireless Sesor Networks Chaghee Joo, Member, IEEE, ad Ness B. Shroff, Fellow, IEEE Abstract I this paper, we study the implicatio of wireless broadcast

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks 3878 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Hierarchical Beamforming for Large One-Dimensional Wireless Networks

Hierarchical Beamforming for Large One-Dimensional Wireless Networks Hierarchical Beamformig for Large Oe-Dimesioal Wireless Networks Alla Merzakreeva, Olivier Lévêque Swiss Federal Istitute of Techology - Lausae, Switzerlad {alla.merzakreeva, olivier.leveque}@epfl.ch Ayfer

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

Converge-Cast with MIMO

Converge-Cast with MIMO Coverge-Cast with MIMO Luoyi Fu, Yi Qi 2, Xibig Wag 3, Xue Liu 4,2,3 Depart. of Electroic Egieerig, Shaghai Jiaotog Uiversity, Chia 4 Depart. of Computer Sciece & Egieerig, Uiversity of Nebraska Licol,

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau, Member, IEEE, Mighua Che, Member, IEEE, ad Soug Ch Liew, Seior Member, IEEE Abstract I the literature, asymptotic studies of multi-hop wireless

More information

Capacity of power constrained ad-hoc networks

Capacity of power constrained ad-hoc networks Capacity of power costraied ad-hoc etworks Rohit Negi, Arjua Rajeswara egi@ece.cmu.edu, arjua@cmu.edu Departmet of Electrical ad Computer Egieerig Caregie Mello Uiversity Abstract hroughput capacity is

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau Computer Laboratory, Uiversity of Cambridge; Dept. of E. & E. Egg., Uiversity College Lodo Chi-Ki.Chau@cl.cam.ac.uk Mighua Che Dept. of Iformatio

More information

Counting on r-fibonacci Numbers

Counting on r-fibonacci Numbers Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

The User Capacity of Barrage Relay Networks

The User Capacity of Barrage Relay Networks The User Capacity of Barrage Relay Networks Thomas R. Halford TrellisWare Techologies, Ic. 16516 Via Esprillo, Suite 300 Sa Diego, CA 92127 Email: thalford@trellisware.com Thomas A. Courtade Ceter for

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

A Class of Interconnection Networks for Multicasting

A Class of Interconnection Networks for Multicasting A Class of Itercoectio Networks for Multicastig Yuayua Yag Departmet of Computer Sciece ad Electrical Egieerig Uiversity of Vermot, Burligto, VT 05405 yag@cs.uvm.edu Abstract Multicast or oe-to-may commuicatios

More information

Information-Theoretic Analysis of an Energy Harvesting Communication System

Information-Theoretic Analysis of an Energy Harvesting Communication System Iformatio-Theoretic Aalysis of a Eergy Harvestig Commuicatio System Omur Ozel Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 omur@umd.edu ulukus@umd.edu

More information

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule Chapter 3 Combiatorics 3.1 Permutatios Readig questios 1. Defie what a permutatio is i your ow words. 2. What is a fixed poit i a permutatio? 3. What do we assume about mutual disjoitedess whe creatig

More information

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im sible umber of wavelegths. The wave~~gt~ ~ ~ ~ c ~ b~dwidth is set low eo~gh to iterfax vices. Oe of the most im ed trasmitters ad ysis much more CO "The author is also f Cumputer sciece Departmet, Uiversity

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission 1 Distributed Resource Maagemet i Multi-hop Cogitive Radio Networs for Delay Sesitive Trasmissio Hsie-Po Shiag ad Mihaela va der Schaar Departmet of Electrical Egieerig (EE), Uiversity of Califoria Los

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

Joint Rate Control and Scheduling for Real-Time Wireless Networks

Joint Rate Control and Scheduling for Real-Time Wireless Networks Joit Rate Cotrol ad Schedulig for Real-Time Wireless Networks Shuai Zuo, I-Hog Hou, Tie Liu, Aathram Swami, ad Prithwish Basu Abstract This paper studies wireless etworks with multiple real-time flows

More information

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance Time-Space Opportuistic Routig i Wireless Ad Hoc Networks, Algorithms ad Performace Fraçois Baccelli, Bartlomiej Blaszczyszy, Paul Muhlethaler To cite this versio: Fraçois Baccelli, Bartlomiej Blaszczyszy,

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network Optimizatio of Base Statio ad Maximizig the Lifetime of Wireless Sesor Network P.Parthiba 1, G.Sudararaj 2, K.A.Jagadheesh 3, P.Maiiarasa 4 SS1 Research Scholar, P.S.G College of Techology, Coimbatore,

More information

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks Ehacemet of the IEEE 8.5. MAC Protocol for Scalable Data Collectio i Dese Sesor Networks Kira Yedavalli Departmet of Electrical Egieerig - Systems Uiversity of Souther Califoria Los Ageles, Califoria,

More information

Cooperative Spectrum Sensing in Cognitive Radio Networks

Cooperative Spectrum Sensing in Cognitive Radio Networks Cooperative Spectrum Sesig i Cogitive Radio Networks Ghurumuruha Gaesa ad Ye (Geoffrey) Li School of Electrical ad Computer Egieerig Georgia Istitute of Techology, Atlata, Georgia 30332 0250 Abstract I

More information

ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT

ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT Joural of Egieerig Sciece ad Techology Vol. 12, No. 7 (2017) 1845-1854 School of Egieerig, Taylor s Uiversity ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT R. SANTHAKUMAR*,

More information

arxiv: v2 [math.co] 15 Oct 2018

arxiv: v2 [math.co] 15 Oct 2018 THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

Methods to Reduce Arc-Flash Hazards

Methods to Reduce Arc-Flash Hazards Methods to Reduce Arc-Flash Hazards Exercise: Implemetig Istataeous Settigs for a Maiteace Mode Scheme Below is a oe-lie diagram of a substatio with a mai ad two feeders. Because there is virtually o differece

More information

Distributed Heuristics for Connected Dominating Sets in Wireless Ad Hoc Networks

Distributed Heuristics for Connected Dominating Sets in Wireless Ad Hoc Networks JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL., NO., MARCH Distributed Heuristics for Coected Domiatig Sets i Wireless Ad Hoc Networks Khaled M. Alzoubi, Peg-Ju Wa, ad Ophir Frieder Abstract: A coected domiatig

More information

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks Optimizig Route Legth i Reactive Protocols for Ad Hoc Networks Thomas Heide Clause *,PhilippeJacquetadLauretVieot INRIA Rocquecourt, Projet Hipercom, Domaie de Voluceau, B.P. 5, 7853 Le Chesay cedex, Frace

More information

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction THE LUCAS TRIANLE RECOUNTED Arthur T Bejami Dept of Mathematics, Harvey Mudd College, Claremot, CA 91711 bejami@hmcedu 1 Itroductio I 2], Neville Robbis explores may properties of the Lucas triagle, a

More information

Performance Evaluation of Scheduling in IEEE Based Wireless Mesh Networks

Performance Evaluation of Scheduling in IEEE Based Wireless Mesh Networks Performace Evaluatio of Schedulig i IEEE 802.6 Based Wireless Mesh Networks Bo Ha, Fug Po Tso, Lidog Li ad Weijia Jia Departmet of Computer Sciece, City Uiversity of Hog Kog 83 Tat Chee Aveue, Kowloo,

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

Wavelength Band Switching in Multigranular Optical WDM Networks

Wavelength Band Switching in Multigranular Optical WDM Networks Wavelegth Bad Switchig i Multigraular Optical WDM Networks Vishal Aad Collaborators X. Cao,, Dr. Y. Xiog ad Dr. C. Qiao LANDER, CSE Departmet, SUNY at Buffalo ~1~ Vishal Aad Outlie λ The Problem with preset

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

E X P E R I M E N T 13

E X P E R I M E N T 13 E X P E R I M E N T 13 Stadig Waves o a Strig Produced by the Physics Staff at Colli College Copyright Colli College Physics Departmet. All Rights Reserved. Uiversity Physics, Exp 13: Stadig Waves o a

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

ASample of an XML stream is:

ASample of an XML stream is: 1 Efficiet Multichael i XML Wireless Broadcast Stream Arezoo Khatibi* 1 ad Omid Khatibi 2 1 Faculty of Computer Sciece, Uiversity of Kasha, Kasha, Ira 2 Faculty of Mathematics, Uiversity of Viea,Viea,

More information

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL., NO., SEPTEMBER 005 35 A Framework for Aalysis of Coectivity ad Performace Bouds i Ad Hoc Networks ad Its Applicatio to a Slotted-ALOHA Sceario Fabrizio

More information

Directional Core Selection Approach for Delay and Delay Variation Multicast Routing

Directional Core Selection Approach for Delay and Delay Variation Multicast Routing 2016 IEEE 18th Iteratioal Coferece o High Performace Computig ad Commuicatios; IEEE 14th Iteratioal Coferece o Smart City; IEEE 2d Iteratioal Coferece o Data Sciece ad Systems Directioal Core Selectio

More information

Message Scheduling for the FlexRay Protocol: The Dynamic Segment

Message Scheduling for the FlexRay Protocol: The Dynamic Segment IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Message Schedulig for the FlexRay Protocol: The Dyamic Segmet Ece Gura Schmidt, Member, IEEE, Klaus Schmidt Abstract The FlexRay commuicatio protocol is expected

More information

Using Color Histograms to Recognize People in Real Time Visual Surveillance

Using Color Histograms to Recognize People in Real Time Visual Surveillance Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission 1 Distributed Resource Maagemet i Multi-hop Cogitive Radio Networs for Delay Sesitive Trasmissio Hsie-Po Shiag ad Mihaela va der Schaar Departmet of Electrical Egieerig (EE), Uiversity of Califoria Los

More information

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION IN MULTICAST NETWORKS Jordi Ros, Wei K. Tsai ad Mahadeve Iyer Departmet of Electrical ad Computer Egieerig Uiversity of Califoria, Irvie, CA 92697 {jros,

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

Stable Throughput Region of Downlink NOMA Transmissions with Limited CSI

Stable Throughput Region of Downlink NOMA Transmissions with Limited CSI Stable Throughput Regio of Dowlik NOMA Trasmissios with imited CSI Yog Zhou ad Vicet W.S. Wog Departmet of Electrical ad Computer Egieerig The Uiversity of British Columbia, Vacouver, Caada e-mail: {zhou,

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1 1. [5] Give sets A ad B, each of cardiality 1, how may fuctios map A i a oe-tooe fashio oto B? 2. [5] a. Give the set of r symbols { a 1, a 2,..., a r }, how may differet strigs of legth 1 exist? [5]b.

More information

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks 2012 IEEE Wireless Commuicatios ad Networkig Coferece: Mobile ad Wireless Networks Optimizatio of Fractioal Frequecy Reuse i Log Term Evolutio Networks Dimitrios Bilios 1,2, Christos Bouras 1,2, Vasileios

More information

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING H. Chadsey U.S. Naval Observatory Washigto, D.C. 2392 Abstract May sources of error are possible whe GPS is used for time comparisos. Some of these mo

More information

BOUNDS FOR OUT DEGREE EQUITABLE DOMINATION NUMBERS IN GRAPHS

BOUNDS FOR OUT DEGREE EQUITABLE DOMINATION NUMBERS IN GRAPHS BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN 2303-4874 (p), ISSN (o) 2303-4955 www.imvibl.org/bulletin Vol. 3(2013), 149-154 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS BANJA

More information

On the Number of Permutations on n Objects with. greatest cycle length

On the Number of Permutations on n Objects with. greatest cycle length Ž. ADVANCES IN APPLIED MATHEMATICS 0, 9807 998 ARTICLE NO. AM970567 O the Number of Permutatios o Obects with Greatest Cycle Legth k Solomo W. Golomb ad Peter Gaal Commuicatio Scieces Istitute, Uiersity

More information

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION XIX IMEKO World Cogress Fudametal ad Applied Metrology September 6, 9, Lisbo, Portugal INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION Dalibor

More information

Measurement-Based Opportunistic Feedback and Scheduling for Wireless Systems

Measurement-Based Opportunistic Feedback and Scheduling for Wireless Systems Measuremet-Based Opportuistic Feedbac ad Schedulig for Wireless Systems Gustavo de Veciaa ad Shailesh Patil Wireless Networig ad Commuicatios Group Dept. of Electrical ad Computer Egieerig The Uiversity

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Selective Periodic Component Carrier Assignment Technique in LTE and LTE-A Systems

Selective Periodic Component Carrier Assignment Technique in LTE and LTE-A Systems Selective Periodic Compoet Carrier Assigmet Techique i LTE ad LTE-A Systems Husu S. Narma ad Mohammed Atiquzzama School of Computer Sciece, Uiversity of Oklahoma, Norma, OK 73019 Email: {husu, atiq}@ou.edu

More information

Indoor Localization by Pattern Matching Method Based On Extended Database

Indoor Localization by Pattern Matching Method Based On Extended Database Vol:8, No:, Idoor Localizatio by atter Matchig Method Based O Exteded Database Gyumi Hwag, Jihog Lee Iteratioal Sciece Idex, Mechaical ad Mechatroics Egieerig Vol:8, No:, waset.org/ublicatio/9997 Abstract

More information

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress.

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress. H2 Mathematics Pure Mathematics Sectio A Comprehesive Checklist of Cocepts ad Skills by Mr Wee We Shih Visit: weshih.wordpress.com Updated: Ja 2010 Syllabus topic 1: Fuctios ad graphs 1.1 Checklist o Fuctios

More information

Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes

Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes Performace Limits ad Practical Decodig of Iterleaved Reed-Solomo Polar Cocateated Codes Hessam Mahdavifar, Mostafa El-Khamy, Jugwo Lee, Iyup Kag 1 arxiv:1308.1144v1 [cs.it] 6 Aug 2013 Abstract A scheme

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

The Effect of Multi-Radio Nodes on Network Connectivity A Graph Theoretic Analysis

The Effect of Multi-Radio Nodes on Network Connectivity A Graph Theoretic Analysis The Effect of Multi-Radio Nodes o Network Coectivity A Graph Theoretic Aalysis Adrás Faragó Departmet of Computer Sciece The Uiversity of Texas at Dallas Richardso, Texas, U.S.A. E-mail: farago@utdallas.edu

More information

Consensus-based Synchronization of Microgrids at Multiple Points of Interconnection

Consensus-based Synchronization of Microgrids at Multiple Points of Interconnection MITSUBISHI EECTRIC RESEARCH ABORATORIES http://www.merl.com Cosesus-based Sychroizatio of Microgrids at Multiple Poits of Itercoectio Shah, S.; Su, H.; Nikovski, D.N.; Zhag, J. TR208-2 August 7, 208 Abstract

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks Eergy-Optimal Olie Algorithms for Broadcastig i Wireless Networks Shay Kutte, Hirotaka Oo, David Peleg, Kuihiko Sadakae, ad Masafumi Yamashita Abstract The paper cosiders the desig of eergy-efficiet olie

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider Wi-Fi or Femtocell: User Choice ad Pricig Strategy of Wireless Service Provider Yajiao Che, Qia Zhag Departmet of Computer Sciece ad Egieerig Hog Kog Uiversity of Sciece ad Techology Email: {cheyajiao,

More information

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks www.ijcsi.org http://dx.doi.org/10.20943/01201604.1115 11 Data Miig of Bayesia Networks to Select Fusio Nodes from Wireless Networks Yee Mig Che 1 Chi-Shu Hsueh 2 Chu-Kai Wag 3 1,3 Departmet of Idustrial

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER 27 3353 Delay Cosideratios for Opportuistic Schedulig i Broadcast Fadig Chaels Masoud Sharif ad Babak Hassibi Abstract We cosider

More information

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks Optimizig Route Legth i Reactive Protocols for Ad Hoc Networks Thomas Clause, Philippe Jacquet, Lauret Vieot To cite this versio: Thomas Clause, Philippe Jacquet, Lauret Vieot. Optimizig Route Legth i

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12 EECS 70 Discrete Mathematics ad Probability Theory Sprig 204 Aat Sahai Note 2 Probability Examples Based o Coutig We will ow look at examples of radom experimets ad their correspodig sample spaces, alog

More information

PERMUTATIONS AND COMBINATIONS

PERMUTATIONS AND COMBINATIONS www.sakshieducatio.com PERMUTATIONS AND COMBINATIONS OBJECTIVE PROBLEMS. There are parcels ad 5 post-offices. I how may differet ways the registratio of parcel ca be made 5 (a) 0 (b) 5 (c) 5 (d) 5. I how

More information

The Institute of Chartered Accountants of Sri Lanka

The Institute of Chartered Accountants of Sri Lanka The Istitute of Chartered Accoutats of Sri Laka Postgraduate Diploma i Busiess ad Fiace Quatitative Techiques for Busiess Hadout 02:Presetatio ad Aalysis of data Presetatio of Data The Stem ad Leaf Display

More information

A New Energy Consumption Algorithm with Active Sensor Selection Using GELS in Target Coverage WSN

A New Energy Consumption Algorithm with Active Sensor Selection Using GELS in Target Coverage WSN IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Prit): 1694-0814 ISSN (Olie): 1694-0784 www.ijcsi.org 11 A New Eergy Cosumptio Algorithm with Active Sesor Selectio

More information