2014 IEEE International Symposium on Information Theory

Ad Hoc Networking With Rate-Limited Infrastructure: Generalized Capacity Scaling Cheol Jeong

Won-Yong Shin

DMC R&D Center Samsung Electronics Suwon, Republic of Korea Email: [email protected]

Computer Science and Engineering Dankook University Yongin, Republic of Korea Email: [email protected]

Abstract—Capacity scaling of a large hybrid network with unit node density, consisting of wireless ad hoc nodes, base stations (BSs) equipped with multiple antennas, and one remote central processor (RCP), is analyzed when wired backhaul links between the BSs and the RCP are rate-limited. We first derive the minimum backhaul link rate required to achieve the same capacity scaling law as in the infinite-capacity backhaul link case. Assuming an arbitrary rate scaling of each backhaul link, a generalized achievable throughput scaling law is then analyzed in the network based on using one of pure multihop, hierarchical cooperation, and two infrastructure-supported routing protocols, and moreover, information-theoretic operating regimes are identified. In addition, to verify the order optimality of our achievability result, a generalized cut-set upper bound under the network model is derived by cutting not only the wireless connections but also the wired connections.

I. I NTRODUCTION Gupta and Kumar’s pioneering work [1] introduced and characterized the sum throughput scaling law in a large wireless ad hoc network. For the network having n nodes randomly distributed in a unit area, it p was shown in [1] that the total throughput scales as Θ( n/ log n) by using the nearest-neighbor multihop (MH) routing strategy.1 In [2], [3], MH schemes were further developed and analyzed in the network. Together with the studies on MH, it was shown that a hierarchical cooperation (HC) strategy [4] achieves an almost linear throughput scaling, i.e., Θ(n1−ǫ ) for an arbitrarily small ǫ > 0, in the dense network of unit area. Since long delay and high cost of channel estimation are needed in ad hoc networks with only wireless connectivity, hybrid networks consisting of both wireless ad hoc nodes and infrastructure nodes, or equivalently base stations (BSs), have been introduced and analyzed in [5], [6]. In a hybrid network where each BS is equipped with a large number of antennas, the optimal capacity scaling was characterized by introducing two new routing protocols, i.e., infrastructure-supported This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2012R1A1A1044151). 1 We use the following notation: i) f (x) = O(g(x)) means that there exist constants C and c such that f (x) ≤ Cg(x) for all x > c, ii) f (x) = o(g(x)) (x) means that limx→∞ fg(x) = 0, iii) f (x) = Ω(g(x)) if g(x) = O(f (x)), iv) f (x) = w(g(x)) if g(x) = o(f (x)), and v) f (x) = Θ(g(x)) if f (x) = O(g(x)) and g(x) = O(f (x)).

978-1-4799-5186-4/14/$31.00 ©2014 IEEE

61

single-hop (ISH) and infrastructure-supported multihop (IMH) protocols [6]. In hybrid networks with ideal infrastructure [5], [6], BSs have been assumed to be fully interconnected by infinite-capacity wired links. In practice, it is rather meaningful to consider a cost-effective finite-rate backhaul link. In order to deal with this issue, the throughput scaling was studied in [7] for a simplified hybrid network, where BSs are connected only to their neighboring BSs via a finite-rate link and the form of achievable schemes is limited only to MH routings. In [8], a hybrid network where BSs are directly interconnected was studied in fundamentally analyzing how much rate per BS-to-BS link is required to guarantee the optimal capacity scaling achieved for the infinite-capacity backhaul link case. More practically, packets arrived at a certain BS in a radio access network are delivered to other BSs through a core network. The cellular network operating based on a remote central processor (RCP) to which all BSs are connected is well suited to this realistic scenario [9]. In this paper, we introduce a more general hybrid network with unit node density, consisting of n wireless ad hoc nodes, multiple BSs, and one RCP, in which wired backhaul links between the BSs and the RCP are rate-limited. Specifically, we take into account a general scenario where three scaling parameters of importance including i) the number of BSs, ii) the number of antennas at each BS, and iii) each backhaul link rate can scale at arbitrary rates relative to n. We first derive the minimum rate of a BS-to-RCP link required to achieve the same capacity scaling law as in the case of infinite-capacity infrastructure. Assuming an arbitrary rate scaling of each backhaul link, we then analyze a new achievable throughput scaling law. Moreover, we identify three-dimensional informationtheoretic operating regimes according to the aforementioned three scaling parameters. Besides the fact that extended networks are power-limited, we are interested in further finding the case where our network is in the infrastructure-limited regime; that is, the performance is limited by the backhaul link rate. In addition, a generalized upper bound on the capacity scaling is derived for our hybrid network with finite-capacity infrastructure based on the cut-set theorem. It is shown that our upper bound matches the achievable throughput scaling for all the operating regimes. We refer to the full paper [10] for the detailed description and all the proofs.

2014 IEEE International Symposium on Information Theory

II. S YSTEM

AND

C HANNEL M ODELS

Access routing

In an extended network, n nodes are uniformly and independently distributed on a square of area n, except for the area where BSs are placed. We randomly pick source– destination pairings. Assume that the BSs are neither sources nor destinations. The network is divided into m square cells of equal area, where a BS with l antennas is located at the center of each cell. The total number of BS antennas in the network is assumed to scale at most linearly with n, i.e., ml = O(n). For analytical convenience, the parameters n, m, and l are related according to n = m1/β = l1/γ , where β, γ ∈ [0, 1) with a constraint β + γ ≤ 1. It is assumed that all the BSs are fully interconnected by wired links through one RCP. For simplicity, the RCP is assumed to be located at the center of the network. In practice, it is natural for each BS-to-RCP (or RCP-to-BS) link to have a finite capacity that may limit the transmission rate of infrastructure-supported routing protocols. In this paper, we assume that each BS is connected to one RCP through an errorless wired link with finite rate RBS = nη for η ∈ (−∞, ∞). The uplink channel vector between node i and BS b is  (u) T (u) (u) jθ jθ jθ (u) e bi,1 e bi,2 e bi,l denoted by hbi = , where (u)α/2 , (u)α/2 , . . . , (u)α/2 rbi,1

rbi,2

rbi,l

(u) rbi,t

is the distance between node i and the tth antenna of (u) BS b, θbi,t is the random phase uniformly distributed over [0, 2π), and α > 2 denotes the path-loss exponent. In a similar manner, the downlink channel vector and the channel between two nodes can be modeled. For the balance between uplink and downlink, it is assumed that each BS satisfies an average transmit power constraint nP/m, while each node satisfies an average transmit power constraint P . Then, the total transmit power of m BSs is the same as the total transmit power consumed by n wireless nodes. By following the same antenna configuration as that of [6], the antennas of a BS are placed as follows: p p 1) If l = w( n/m) and l = O(n/m), then n/m antennas are regularly placed on the BS boundary and the remaining antennas are uniformly placed inside the boundary.p 2) If l = O( n/m), then l antennas are regularly placed on the BS boundary.2 The aggregate throughput Tn of the network is defined as Tn = nRn , where Rn is the average transmission rate of each Tn source, and its scaling exponent e is given by limn→∞ log log n . III. ROUTING P ROTOCOLS W ITH AND W ITHOUT I NFRASTRUCTURE S UPPORT In this section, the routing protocols supported by BSs having multiple antennas in [6] are illuminated in our network.

BS-to-RCP routing

RCP-to-BS routing

Exit routing

RCP BS

Antenna

Node

Uplink transmission

Downlink transmission

Fig. 1. The ISH protocol. Each square represents a cell in the network. Access routing

BS-to-RCP routing

RCP-to-BS routing

Exit routing

RCP BS

Node

Antenna

Uplink transmission

Downlink transmission

Fig. 2. The IMH protocol. Each square represents a cell in the network.

of the source using three stages: access routing, backhaul transmission, and exit routing. 1) ISH Protocol: There are Θ(n/m) nodes with high probability in each cell [4, Lemma 4.1]. For the access routing, all source nodes in each cell transmit their packets simultaneously to the home-cell BS via single-hop multipleaccess. The packets of source nodes in one cell are then jointly decoded at the BS, assuming that the signals transmitted from the other cells are treated as noise. In the next stage, the decoded packets are transmitted from the BS to the RCP via BS-to-RCP link and then delivered to the corresponding BSs via RCP-to-BS links. For the exit routing, each BS in each cell transmits n/m packets received from the RCP, via singlehop broadcast to all the wireless nodes in its cell. The ISH protocol is illustrated in Fig. 1. 2) IMH Protocol: Since the extended network is fundamentally power-limited, the ISH protocol may not be effective especially when the node–BS distance is quite long, which motivates us to introduce the IMH protocol illustrated in Fig. 2. Each cell is further divided into smaller square p cells of area 2 log n, termed routing cells. Since min{l, n/m} p antennas are regularly placed on the BS boundary, min{l, n/m} MH paths can be created in each cell. For the access routing, each antenna placed only on the BS boundary can receive its packet transmitted from one of the nodes in the nearest-neighbor routing cell. The BS-to-RCP and RCP-to-BS transmission is the same as the ISH protocol case. For the exit routing, each antenna on the BS boundary transmits the packet to one of the nodes in the nearest-neighbor routing cell. B. Routing Protocols Without Infrastructure Support

A. Routing Protocols With Infrastructure Support In infrastructure-supported routing protocols, the packet of a source is delivered to the corresponding destination 2 Such an antenna deployment guarantees the nearest-neighbor transmission from/to each BS antenna, and thus enables the IMH protocol to work well.

62

The protocols based only on infrastructure support may not be sufficient to achieve the optimal capacity scaling especially for small m and l. Using one of the MH transmission [1] and the HC strategy [4] may be beneficial in terms of improving the achievable throughput scaling.

2014 IEEE International Symposium on Information Theory

b

TABLE I A CHIEVABILITY RESULT FOR A HYBRID EXTENDED NETWORK WITH INFINITE - CAPACITY INFRASTRUCTURE [6]

1

1 2

g = ( b 2 - 3b + 2) 1/2 B

Regime A

D

B A

C

C 0

1/2

1

g

Condition 2<α<3 α≥3 2 < α < 4 − 2β − 2γ α ≥ 4 − 2β − 2γ 2<α<3−β α ≥ 3−β 2<α<

Fig. 3. The operating regimes on the achievable throughput scaling with respect to β and γ for η → ∞.

C. The Transmission Rates of Routing Protocols

IV. ACHIEVABILITY R ESULT

We first introduce two-dimensional operating regimes with respect to scaling parameters β and γ for the infinite-capacity backhaul link scenario. We then derive the minimum rate of each backhaul link, required to achieve the optimal capacity scaling. Assuming that the rate of each backhaul link scales at an arbitrary rate relative to n, we characterize a new achivable throughput scaling. Furthermore, we scrutinize our achievability result according to the three-dimensional operating regimes identified by introducing a new scaling parameter η. Regimes

With

≤α<1+

α≥1+

2γ 1−β

2γ 1−β

1 2

2− α 2 β+γ α 2− 2

HC ISH IMH

α 2

1+

1+β 2 2− α 2 α(1−β) γ− 2 1+β 2

B. The Minimum Required Rate of Backhaul Links

As addressed earlier, the RCP is incorporated into the hybrid network model using BSs. We remark that the transmission rates in both access and exit routings are irrelevant to the rate of backhaul links and thus are essentially the same as the infinite-capacity backhaul link case [6]. The transmission rates of the ISH and IMH protocols at each cell   are given by Ω l(m/n)α/2−1 and Ω min l, (n/m)1/2−ǫ , respectively, for an arbitrarily small ǫ > 0. The total throughput scaling laws achieved by the MH and HC protocols are given by Ω n1/2−ǫ [1] and Ω n2−α/2−ǫ [4], respectively.

A. Two-Dimensional Operating Capacity Infrastructure

D

2(1−γ) β

2(1−γ) β

e 2−

Scheme HC MH HC IMH HC IMH

Infinite-

As illustrated in Fig. 3, when η → ∞, the two-dimensional operating regimes with respect to β and γ are divided into four sub-regimes. The best scheme and its corresponding throughput scaling exponent e in each regime are summarized in Table I. The four sub-regimes are described as follows. • In Regime A, the infrastructure is not helpful to improve the capacity scaling since β and γ are too small. • In Regime B, the HC and IMH protocols are used to achieve the optimal capacity scaling. As α increases, the IMH outperforms the HC. • In Regime C, using the HC and IMH protocols guarantees the order optimality as in Regime B. • In Regime D, the HC protocol has the highest throughput when α is small, but as α increases, the best scheme becomes the ISH protocol. Finally, the IMH protocol becomes dominant when α is very large.

63

In order to give a cost-effective backhaul solution for a large-scale network, we derive the minimum required rate CBS of each link between a BS and the RCP. Theorem 1: The minimum rate of each backhaul link required to achieve the optimal capacity scaling of hybrid networks with infinite-capacity infrastructure is given by  0 for Regime A     for Regime B  Ω (l)    n 1/2−ǫ CBS = (1) Ω for Regime C    m    log (n/l)−1  m  Ω l m for Regime D n for an arbitrarily small constant ǫ > 0. Remark 1: From Theorem 1, it is shown that CBS = O(nǫ ) if γ = ǫ in Regimes B and D or if β = 1 − ǫ in Regimes C and D. This result reveals that for the case where the number of antennas at each BS is very small or the number of BSs is almost the same as the number of nodes, surprisingly, the backhaul link rate RBS does not need to be infinitely high. C. Generalized Achievable Throughput Scaling With FiniteCapacity Infrastructure If RBS is smaller than CBS in Theorem 1, then the throughput Tn will be decreased accordingly depending on the operating regimes for which the infrastructure-supported routing protocols are used. In this subsection, Tn is derived with an arbitrary rate scaling of RBS . Theorem 2: In the hybrid network with the backhaul link rate RBS , the aggregate throughput Tn scales as       m α/2−1 Ω max min max ml , n    n 1/2−ǫ  min ml, m , mRBS , m o n1/2−ǫ , n2−α/2−ǫ , (2) where ǫ > 0 is an arbitrarily small constant. Remark 2 (Infrastructure-limited regimes): Let us introduce the infrastructure-limited regime where the performance is limited by the backhaul link rate RBS . Two new operating ˜ and D ˜ causing an infrastructure limitation for some regimes B

2014 IEEE International Symposium on Information Theory

TABLE II A CHIEVABILITY RESULT FOR A HYBRID NETWORK WITH FINITE - CAPACITY INFRASTRUCTURE Regime ˜ B

˜ D

Condition 2 < α < 4 − 2β − 2η α ≥ 4 − 2β − 2η 2 < α < 4 − 2β − 2η 2(γ−η) 4 − 2β − 2η ≤ α < 2 + 1−β 2+

2(γ−η) 1−β

≤α<1+

α≥1+

2γ 1−β

2γ 1−β

1 1 -h 2

e 2− α 2 β+η 2− α 2 β+η

Scheme HC IMH HC ISH ISH

b

B

1/2 A

α(1−β) 2 1+β 2

1+γ−

IMH

h

-1/2

b 1

0

1/2

1 2

g = ( b 2 - 3b + 2)

1 A

g = b 2 + (h - 2) b + 1 D

1 -h -1/2

g

Fig. 5. The operating regimes with respect to β, γ, and η, where − 21 ≤ η < 0.

b

h

1

0

1

1 - 2h

g

C D

1/2 Fig. 4. The operating regime with respect to β, γ, and η, where η < − 21 .

˜ and α are identified in Table II. More specifically, Regimes B ˜ become infrastructure-limited when α ≥ 4 − 2β − 2η and D ˜ 4 − 2β − 2η ≤ α < 2 + 2(γ−η) 1−β , respectively. In Regime B, the IMH protocol is dominant when α ≥ 4 − 2β − 2η. In Regime ˜ the following interesting observations are made according D, to the value of α: 2(γ−η) • (High path-loss attenuation regime) If α ≥ 2 + 1−β , then the network using the ISH and IMH protocols is limited by the access and exit routings not by the backhaul transmission. • (Medium path-loss attenuation regime) If 4 − 2β − 2η ≤ α < 2 + 2(γ−η) 1−β , then the network using the ISH protocol is limited by the backhaul transmission but achieves a higher throughput than that of pure ad hoc routings, which is thus in the infrastructure-limited regime. • (Low path-loss attenuation regime) If α < 4 − 2β − 2η, neither the ISH nor IMH protocol can outperform the HC strategy. The two-dimensional operating regimes specified by β and γ in Fig. 3 can be extended to three-dimensional operating regimes by introducing η. We identify the three-dimensional operating regimes by illustrating five types of two-dimensional regimes, showing different characteristics, with respect to β and γ according to the value of η. Remark 3 (Three-dimensional operating regimes): The operating regimes with respect to β and γ are plotted in Figs. 4–7 for η < −1/2, −1/2 ≤ η < 0, 0 ≤ η < 1/2, and 1/2 ≤ η < 1, respectively. Let us scrutinize each case. 1 • η < − 2 : As shown in Fig. 4, the entire regimes are included in Regime A. This indicates that the infrastructure √ does not improve the capacity scaling if RBS = o(1/ n).

64

B

B 1 -h 2

A 0

h

1/2

1

g

Fig. 6. The operating regimes with respect to β, γ, and η, where 0 ≤ η <









1 . 2

− 21 ≤ η < 0: As η becomes greater than −1/2, the infrastructure can improve the capacity scaling for some cases, but the network is limited by the backhaul ˜ (see Fig. 5).3 transmission, thereby resulting in Regime B 1 ˜ ˜ 0 ≤ η < 2 : In Regimes B and D, the network using either the ISH or IMH protocol is still limited by the backhaul ˜ or transmission (specifically when the IMH in Regime B ˜ the ISH in Regime D is used). We refer to Fig. 6. 1 2 ≤ η < 1: As η further increases beyond 1/2, Regime ˜ ˜ gets reduced (see B disappears and the area of Regime D Fig. 7). η ≥ 1: As long as RBS = Ω(n), the network has no infrastructure limitation at all. The associated operating regimes are shown in Fig. 3. V. C UT-S ET U PPER B OUND

A generalized cut-set upper bound on the aggregate capacity scaling based on the information-theoretic approach is derived for the hybrid network with rate-limited BS-to-RCP (or RCPto-BS) links. As illustrated in Fig. 8, to provide a tight upper bound, two cuts L1 and L2 are taken into account. Similarly as in [6], the cut L1 divides the network area into two halves by cutting the wireless connections between wireless source 3 In this case, even if each backhaul link rate R BS approaches zero as n tends to infinity, mRBS scales faster than one (i.e., mRBS = ω(1)).

2014 IEEE International Symposium on Information Theory

capacity infrastructure (η → ∞). Now, let us turn to the cut L2 in Fig. 8(b), which deals with information flows over the wired connections as well as the wireless connections. Under (2) L2 , an upper bound on Tn is shown in the following lemma. Lemma 2: Under the cut L2 in Fig. 8(b), an upper bound (2) on the aggregate capacity, Tn , of the hybrid network with rate-limited infrastructure is given by o  n (4) Tn(2) = O max mRBS , n1/2+ǫ , n2−α/2+ǫ ,

b 1 1 2

g = ( b 2 - 3b + 2) 1/2

D B

g = b 2 + (h - 2) b + 1

C

1 -h

D A 0

1/2

h

1

g

Fig. 7. The operating regimes with respect to β, γ, and η, where Wireless node

L1

S

Infrastructure node

BS-to-RCP link

1 2

≤ η < 1.

L2

RCP

D

S

D

(a) The cut L1

D

(b) The cut L2

Fig. 8. The cuts L1 and L2 in the network. The BS-to-RCP or RCP-to-BS links are not shown in (a) since they are not in effect under L1 .

nodes on the left of the network and the other nodes, including all BS antennas and one RCP. In addition, to fully utilize the main characteristics of the network with finite-capacity infrastructure, we consider another cut L2 , which divides the network area into another two halves by cutting the wired connections between BSs and the RCP as well as the wireless connections between all nodes (including BS antennas) located on the left of the network and all nodes (including BS antennas and the RCP) on the right. Upper bounds obtained under the cuts L1 and L2 are denot(1) (2) ed by Tn and Tn , respectively. By the cut-setntheorem, the o (1) (2) total capacity is upper-bounded by Tn ≤ min Tn , Tn . (1)

Under L1 , the total throughput Tn for sources on the left half is bounded by the capacity of the multiple-input multipleoutput channel between the sets of sources and destinations. Lemma 1: Under the cut L1 in Fig. 8(a), an upper bound (1) on the aggregate capacity, Tn , of the hybrid network with rate-limited infrastructure is given by      r  m α/2−1 n (1) ǫ Tn = O n max ml , m min l, , n m o √ n, n2−α/2 , (3) where ǫ > 0 is an arbitrarily small constant. (1) The upper bound Tn matches the achievable throughput scaling within a factor of nǫ in the network with infinite-

65

where ǫ > 0 is an arbitrarily small constant. In consequence, an upper bound on the aggregate capacity is established based on using the min-cut of the network, and is presented in the following theorem. Theorem 3: In the hybrid network with the backhaul link rate RBS , the aggregate throughput Tn is upper-bounded by      m α/2−1 O max min max nǫ ml , n   r  n , mRBS , nǫ m min l, m o 1/2+ǫ 2−α/2+ǫ n ,n , (5) where ǫ > 0 is an arbitrarily small constant. Remark 4: The upper bound in (5) matches the achievable throughput scaling in Theorem 2 within nǫ in the hybrid extended network with the finite backhaul link rate RBS . In other words, choosing the best of the four achievable schemes ISH, IMH, MH, and HC is order-optimal for all the operating regimes (even if the rate of each backhaul link is finite). R EFERENCES [1] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388–404, Mar. 2000. [2] M. Franceschetti, O. Dousse, D. N. C. Tse, and P. Thiran, “Closing the gap in the capacity of wireless networks via percolation theory,” IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1009–1018, Mar. 2007. [3] W.-Y. Shin, S.-Y. Chung, and Y. H. Lee, “Parallel opportunistic routing in wireless networks,” IEEE Trans. Inf. Theory, vol. 59, no. 10, pp. 6290–6300, Oct. 2013. ¨ ur, O. L´evˆeque, and D. N. C. Tse, “Hierarchical cooperation [4] A. Ozg¨ achieves optimal capacity scaling in ad hoc networks,” IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3549–3572, Oct. 2007. [5] A. Zemlianov and G. de Veciana, “Capacity of ad hoc wireless networks with infrastructure support,” IEEE J. Select. Areas Commun., vol. 23, no. 3, pp. 657–667, Mar. 2005. [6] W.-Y. Shin, S.-W. Jeon, N. Devroye, M. H. Vu, S.-Y. Chung, Y. H. Lee, and V. Tarokh, “Improved capacity scaling in wireless networks with infrastructure,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5088–5102, Aug. 2011. [7] C ¸. C ¸ apar, D. Goeckel, D. Towsley, R. Gibbens, and A. Swami, “Capacity of hybrid networks,” in Proc. Annual Conf. Int. Technol. Alliance (ACITA), Southampton, UK, Sept. 2012, pp. 1–8. [8] C. Jeong and W.-Y. Shin, “Large-scale ad hoc networks with rate-limited infrastructure: Information-theoretic operating regimes,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Istanbul, Turkey, July 2013, pp. 424–428. [9] A. Sanderovich, O. Somekh, H. V. Poor, and S. Shamai, “Uplink macro diversity of limited backhaul cellular network,” IEEE Trans. Inf. Theory, vol. 55, no. 8, pp. 3457–3478, Aug. 2009. [10] C. Jeong and W.-Y. Shin, “Ad hoc networking with rate-limited infrastructure: Generalized capacity scaling,” preprint, [Online]. Available: http://arxiv.org/abs/1402.2042.

Ad Hoc Networking With Rate-Limited Infrastructure ... - IEEE Xplore

Computer Science and Engineering. Dankook University. Yongin, Republic of Korea. Email: [email protected]. Abstract—Capacity scaling of a large hybrid ...

312KB Sizes 2 Downloads 344 Views

Recommend Documents

Secure Mobile Ad hoc Routing - IEEE Xplore
In mobile ad hoc networks (MANETs), multi-hop mes- sage relay is the common way for nodes to communicate and participate in network operations, making ...

Stable Topology Control for Mobile Ad-Hoc Networks - IEEE Xplore
Abstract—Topology control is the problem of adjusting the transmission parameters, chiefly power, of nodes in a Mobile. Ad Hoc Network (MANET) to achieve a ...

Dynamic Local Clustering for Hierarchical Ad Hoc ... - IEEE Xplore
Hierarchical, cluster-based routing greatly reduces rout- ing table sizes compared to host-based routing, while reduc- ing path efficiency by at most a constant factor [9]. More importantly, the amount of routing related signalling traffic is reduced

pdf-1459\wireless-ad-hoc-networking-personal-area-local ...
... apps below to open or edit this item. pdf-1459\wireless-ad-hoc-networking-personal-area-lo ... reless-networks-and-mobile-communications-from-a.pdf.

Energy Efficiency in the Mobile Ad Hoc Networking ...
monitoring bovine animals potentially offers high increase in the profitability ... The recent progress in the energy efficient wireless network ... detecting pregnancy, much cheaper than currently used rectal .... over Internet, from mobile phones,

Mobile ad hoc networking: imperatives and challenges
each other, but can also receive Internet services through .... Location Based Services include finding nearest service providers, such as restaurant or cinema;.

Infrastructure for a clinical- decision-intelligence system - IEEE Xplore
Dec 27, 2006 - management and application development. The goal of ... discuss the functional requirements and reference architecture for CDI systems and.

ArCMAPE: A Software Product Line Infrastructure to ... - IEEE Xplore
from Software Product Line Engineering to support fault-tolerant composite services ... ational software [1] by employing redundant software compo- nents called ...

Distributed Average Consensus With Dithered ... - IEEE Xplore
computation of averages of the node data over networks with band- width/power constraints or large volumes of data. Distributed averaging algorithms fail to ...

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

Investigating Sensor Networks with Concurrent ... - IEEE Xplore
The background behind this demonstration is described as an one-page poster submission. The goal is to show a flow of tools for quick sensor network modeling, from an high level abstraction down to a system validation, including random network genera

Providing Secrecy with Lattice Codes - IEEE Xplore
Wireless Communications and Networking Laboratory. Electrical Engineering Department. The Pennsylvania State University, University Park, PA 16802.

Trellis-Coded Modulation with Multidimensional ... - IEEE Xplore
constellation, easier tolerance to phase ambiguities, and a better trade-off between complexity and coding gain. A number of such schemes are presented and ...

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

Compressive Sensing With Chaotic Sequence - IEEE Xplore
Index Terms—Chaos, compressive sensing, logistic map. I. INTRODUCTION ... attributes of a signal using very few measurements: for any. -dimensional signal ...

Research Tools for 3-D Mobile Ad-hoc Networking with ...
Network Analysis and Systems Department. HRL Laboratories ... current wireless network simulation ... Such potential benefits have led to growing interest in ...

Research Tools for 3-D Mobile Ad-hoc Networking with ...
Future battlefield networks will consist of various heterogeneous networking systems and tiers with disparate capabilities and characteristics, ranging from ground ad-hoc mobile and sensor networks to airborne-rich sky networks to satellite networks.

I iJl! - IEEE Xplore
Email: [email protected]. Abstract: A ... consumptions are 8.3mA and 1.lmA for WCDMA mode .... 8.3mA from a 1.5V supply under WCDMA mode and.

Gigabit DSL - IEEE Xplore
(DSL) technology based on MIMO transmission methods finds that symmetric data rates of more than 1 Gbps are achievable over four twisted pairs (category 3) ...