IEICE TRANS. COMMUN., VOL.E98–B, NO.11 NOVEMBER 2015

2202

PAPER

Beamwidth Scaling in Wireless Networks with Outage Constraints Trung-Anh DO†a) , Nonmember and Won-Yong SHIN†b) , Member

SUMMARY This paper analyzes the impact of directional antennas in improving the transmission capacity, defined as the maximum allowable spatial node density of successful transmissions multiplied by their data rate with a given outage constraint, in wireless networks. We consider the case where the gain Gm for the mainlobe of beamwidth can scale at an arbitrarily large rate. Under the beamwidth scaling model, the transmission capacity is analyzed for all path-loss attenuation regimes for the following two network configurations. In dense networks, in which the spatial node density increases with the antenna gain Gm , the transmission capacity scales as G4/α m , where α denotes the path-loss exponent. On the other hand, in extended networks of fixed node density, the transmission capacity scales logarithmically in Gm . For comparison, we also show an ideal antenna model where there is no sidelobe beam. In addition, computer simulations are performed, which show trends consistent with our analytical behaviors. Our analysis sheds light on a new understanding of the fundamental limit of outage-constrained ad hoc networks operating in the directional mode. key words: beamwidth scaling, directional antenna, outage constraint, scaling law, transmission capacity, wireless network

1. Introduction The transmission capacity characterizes the area spectral efficiency, defined as the maximum allowable spatial node density of successful transmissions multiplied by their data rate subject to an outage constraint in wireless ad hoc networks [1]. In [2], the transmission capacity is collectively analyzed in a variety of network scenarios by using various techniques such as spread spectrum [1], [3], spectrum allocation (e.g., spectrum sharing [4] and spectrum partitioning [5], [6]), successive interference cancellation [7], joint detection [8], power control [9], threshold scheduling [10], and multiple antennas [11], [12]. Complementary to the transmission capacity research, an alternative approach to characterizing the performance of ad hoc networks has been introduced by analyzing the capacity scaling law, so-called the transport capacity, that quantifies how the aggregate capacity grows with the number of nodes [13]. The transport capacity scaling in a network of unit area was shown to be achieved using the nearestneighbor multihop routing scheme (also known as Gupta– Kumar routing scheme). Multihop schemes were further studied and analyzed in [14]–[18]. There has also been Manuscript received March 12, 2015. Manuscript revised July 22, 2015. † The authors are with the Department of Computer Science and Engineering, Dankook University, Yongin 448-701, Republic of Korea. a) E-mail: [email protected] b) E-mail: [email protected] (Corresponding author) DOI: 10.1587/transcom.E98.B.2202

research on improving the transport capacity up to a linear scaling in the number of nodes by using novel techniques such as networks with node mobility [19], interference alignment [20], directional antennas [21], [22], and infrastructure support [23], [24]. Within the transport capacity framework [13]–[24], idealized centralized scheduling is used, where it can eliminate outages by carefully determining the optimal set of transmitters in each time slot, which is not feasible in practice. On the other hand, the transmission capacity framework in [1]–[12] allows the use of only uncoordinated transmissions, which fails to schedule simultaneous transmissions with the objective of controlling interference levels, thus causing outages. 1.1 Related Work In the literature, studies on the transmission capacity have focused mostly on wireless network scenarios using omnidirectional antennas at each node. However, for wireless systems using millimeter wave (mmWave) technologies [25] operating in the 10–300 GHz band, which have been considered as one solution enabling-gigabit-per-second data rates, equipping directional antennas at each node may be more challenging. This is because mmWave links are inherently directional and thus steerable antenna arrays can be easily implemented, thereby resulting in a much higher link gain [26]. For this reason, the use of directional antennas in ad hoc networks has recently emerged as a promising technology leading to higher spatial reuse ratios, improved transmission distances, and reduced interference levels at low cost [21], [22], [27]–[33]. Specifically, the previous work on the transport capacity scaling based on the directional protocol model [27] showed that, for an infinitely large antenna gain (or equivalently, for an infinitely small beamwidth), directional antennas offer magnificent potential for improving the throughput performance up to a linear scaling in the number of nodes, which is the best we can hope for. Similarly, the transport capacity was studied based on a general interference model for directional antennas [21], [22], [28]. Other studies have examined the transport capacity when directional antennas are used under different assumptions as well as different situations [29]–[31]. In addition, in [32], the transport capacity based on the information-theoretic approach was recently analyzed by introducing the elastic multihop routing protocol in wireless networks equipping directional antennas. In [33], in the directional mode, the effects of beam misdirection on the transmission capac-

c 2015 The Institute of Electronics, Information and Communication Engineers Copyright 

DO and SHIN: BEAMWIDTH SCALING IN WIRELESS NETWORKS WITH OUTAGE CONSTRAINTS

2203

ity were investigated, and capacity-maximizing beamwidths were found in the presence of orientation error. 1.2 Main Contributions In this paper, we analyze in detail, for the first time, how the transmission capacity scaling behaves in large-scale outageconstrained wireless networks when a single directional antenna is equipped at each node. We use a simplified hybrid antenna model with both mainlobe and sidelobe, where the gain Gm for the mainlobe of beamwidth is assumed to scale at an arbitrarily large rate as the beamwidth becomes narrower. The impact of such a beamwidth scaling in improving the transmission capacity subject to an outage constraint is analyzed in both dense and extended network configurations. For all path-loss attenuation regimes, we first derive upper and lower bounds on the outage probability by characterizing two different types of interference. Based on closedform expressions of the two bounds on the outage probability, it is shown that the transmission capacity scales as Gm 4/α in dense networks where the spatial node density increases with the antenna gain Gm , whereas, in extended networks of fixed node density where the network size is proportional to the number of nodes, the transmission capacity scales as log Gm . These results indicate that using directional antennas can provide a significantly high node density (i.e., a lot of simultaneous transmission pairs) in dense networks and an increased data rate of each transmission pair up to a logarithmic scale in extended networks. Thus, if such a steerable directional antenna system with a narrow beamwidth is implementable, then a substantial network throughput gain can be attainable even with no use of multiple antennas. For comparison, we also analyze an ideal antenna model where there is no sidelobe beam. Numerical results are provided for both dense and extended networks to validate the transmission capacity scaling in practical antenna gain regimes. Throughout this paper, P(·) and E[·] denote the probability and statistical expectation, respectively. Unless otherwise stated, all logarithms are assumed to be to the base 2. 1.3 Organization The rest of this paper is organized as follows. In Sect. 2, we introduce the system model. In Sect. 3, the transmission capacity scaling laws are analyzed for both dense and extended networks. An ideal scenario with no sidelobe is analyzed and numerical evaluation is shown in Sect. 4. Finally, we summarize the paper with some concluding remarks in Sect. 5. 2. System Model As in [1], [2], we consider an ad hoc wireless network, where the distribution of nodes in the network follows a homogeneous Poisson point process (PPP) of density λ on a

Fig. 1 The wireless network using directional antennas. Each transmitter generates interference to the reference receiver, indicated by the dash lines, where r denotes the distance between a transmitter and the corresponding receiver.

Fig. 2

The beam pattern of our directional antenna model.

plane R2 . We pick pairings so that each transmitter is assigned to one receiver at a fixed distance r > 0 (refer to Fig. 1). Each node is equipped with a single directional antenna and transmits with constant power P. As illustrated in Fig. 2, we define a hybrid antenna model whose mainlobe is characterized as a sector and whose sidelobe forms a circle (backlobes are ignored in this model)† . The antenna beam pattern has a gain value Gm for the mainlobe of beamwidth θ ∈ (0, 2π]†† , and also has a sidelobe of gain G s of beamwidth 2π − θ. The parameters Gm and G s are then related according to θ Gm 2π − θ 1 + = , 2π G s 2π Gs where 0 < G s ≤ 1 ≤ Gm . In our work, we assume that Gm = Θ(1/θ) and G s = Θ(1)††† , which does not violate the law of energy conservation. For simplicity, we assume unit antenna efficiency, i.e., no antenna loss. Nodes can use their antennas for directional transmission or directional reception, where the transmitter and receiver antenna gains are assumed to be the same. We also assume that each antenna is steerable, i.e., each node can point its antenna in any desired direction. Packets are delivered to the corresponding receiver (destination) using a single-hop transmission, † Instead of directional antennas modelled as a cone in a threedimensional view, we use a rather simple two-dimensional antenna model since simplifying the shape of the antenna pattern will not cause any fundamental change in term of scaling law. †† Our system model can be extended to multi-antenna scenarios, but such an extension does not change our scaling results if the number of antennas at each node is independent of Gm . ††† We use the following notation: i) f (x) = O(g(x)) means that there exist constants C and c such that f (x) ≤ Cg(x) for all x > c, ii) f (x) = Ω(g(x)) means that f (x) ≥ Cg(x) , and iii) f (x) = Θ(g(x)) if f (x) = O(g(x)) and f (x) = Ω(g(x)) [34].

IEICE TRANS. COMMUN., VOL.E98–B, NO.11 NOVEMBER 2015

2204

which may be feasible with the help of directional antennas. θ Let p = 2π denote the probability that a transmitter is located in the coverage of the mainlobe of an arbitrary receiver. Let Π1 , Π2 , and Π3 denote three different sets of simultaneously transmitting nodes according to beam directions—specifically, it follows that both nodes, i1 ∈ Π1 and the reference receiver, beamform to each other with probability p2 , either i2 ∈ Π2 or the reference receiver beamforms to the other node (but not both) with probability 2p(1 − p), and neither i3 ∈ Π3 nor the reference receiver beamforms to the other node with probability (1 − p)2 , as illustrated in Fig. 3. Now, let us turn to channel modeling. We consider only path-loss attenuation effects, and ignore additional channel effects such as small-scale fading, which may be negligible as long as scaling law is concerned. Then, the received signal power from the intended transmitter is Pr = PG2m r−α ,

(1)

and the total amount of interference at the reference receiver from all simultaneously transmitting nodes is    −α I= PG2m ri−α + PG G r + PG2s ri−α , (2) m s i 1 2 3 Π1

Π2

Π3

where the parameter rik (k = 1, 2, 3) denotes the distance between transmitter i in the set Πk and the reference receiver, and α > 2 denotes the path-loss exponent. We assume that the additive ambient noise power is denoted by η. We do not assume the use of any multiuser detection schemes at each receiver while treating interference as noise.

where Pr and I are given in (1) and (2), respectively. Using (1), (3) can be rewritten as  = P(Υ > T d ), where Υ = Td =

I P

(4)

and

G2m r−α η − . β P

(5)

In the omnidirectional mode, closed-form expressions of the outage probability were analyzed only for the pathloss exponent α = 4 [2]. It is, however, analytically intractable to obtain the exact outage probability for general α values. Instead, in our work, similarly as in [1], [3], [4], [7], [9], [11], both upper and lower bounds on the outage probability are characterized in the network model under consideration. Now, we derive upper and lower bounds on the outage probability in the directional mode. Under our large-scale fading model, outage can be determined depending heavily on the positions of transmitting nodes (i.e., interferers) located according to a PPP on R2 . To give a lower bound on the outage probability, we first define the dominant interferer. An interferer is called dominant if its interference level, normalized by P, that affects the reference receiver is greater than a threshold T d in (5). Thus, the lower bound indicates how often there is at least one interferer that is strong enough to cause an outage, which is established in the following lemma. For notational convenience, we start from letting 4

2

4

f (Gm ) = p2Gm α +2p(1− p)(GmG s ) α +(1− p)2G s α , (6)

3. Transmission Capacity Scaling

where p =

In this section, we present the transmission capacity scaling law as a function of the gain Gm for two different types of wireless networks (i.e., dense and extended networks) using directional antennas. As in [1]–[4], [7], [9], [11], we define the transmission capacity as

Lemma 1. In the directional mode, a lower bound on the outage probability is given by ⎛ ⎞ ⎜⎜⎜ λπ ⎟⎟ l = 1 − exp ⎜⎜⎝− 2/α f (Gm )⎟⎟⎟⎠ , (7) Td

CT = Rλ(1 − ) [bits/sec/Hz/m2 ],

θ 2π .

where T d and f (Gm ) are given in (5) and (6), respectively.

where R = log2 (1 + β) is the common data rate per pair. Here,  and β denote the outage probability and a target threshold of the received signal-to-interference-and-noiseratio (SINR) required for successful reception, respectively. An attempted transmission is successful if the received SINR is above β; otherwise, the transmission fails, i.e., an outage occurs.

Proof. Let hk and rik denote the channel gain and distance between transmitter i ∈ Πk (k = 1, 2, 3) and the reference receiver, respectively. Then, it follows that ⎧ 2 ⎪ if k = 1 G ⎪ ⎪ ⎪ m ⎨ hk = ⎪ (8) GmG s if k = 2 ⎪ ⎪ ⎪ ⎩G2 if k = 3. s

3.1 Outage Analysis

From (2), (4), and (8), the probability that an outage is caused by a certain one dominant interferer i ∈ Πk is given by

Let us first focus on computing outage probabilities, which are essential to find the transmission capacity. The target outage probability is defined as   Pr <β , (3) =P I+η

 = P(hk ri−α > Td ) k   = P rik < dk , where

(9)

DO and SHIN: BEAMWIDTH SCALING IN WIRELESS NETWORKS WITH OUTAGE CONSTRAINTS

2205

Fig. 3 Two types of interferers (i.e., dominant and non-dominant interferers) according to three beam directions, where dk (k = 1, 2, 3) is given in (10).

 dk =

Td hk

−1/α ,

(10)

which denotes the radius of a disk where the dominating node can be placed, as illustrated in Fig. 3. Let Πdom and λk k denote the set consisting of all dominant interferers and the node density, respectively, in the set Πk (k = 1, 2, 3). Under the PPP network, it is shown that the probability that there is no transmitter in the disk of radius dk is given by     P Πdom = ∅ = exp −λk πdk2 k (refer to [1] for the detailed proof). Thus, the probability that there is no dominant interferer over the whole network is given by       P Πdom = ∅ P Πdom = ∅ P Πdom =∅ 1 2 3     = exp −p2 λπd12 exp −2p(1 − p)λπd22   · exp −(1 − p)2 λπd32 Using (11) finally leads to (7), which completes the proof of the lemma.  Next, we derive an upper bound on the outage probability by considering both dominant and non-dominant interferers. An interferer is called non-dominant if it is located outside the disk depicted in Fig. 3. Lemma 2. In the directional mode, an upper bound on the outage probability is given by u = l +

2πλ(1 − l ) (α − 2)T d2/α

,

(11)

where T d and l are given in (5) and (7), respectively. Proof. Let Π denote the set consisting of all dominant interferers deployed over the network. Then, it follows that dom

P(Υ > T d ) = P(Υ > T d |Πdom  ∅)P(Πdom  ∅) + P(Υ > T d |Πdom = ∅)P(Πdom = ∅) = l + P(Υn-dom > T d )P(Πdom = ∅),

where l is the outage probability caused by the dominant interferers, as derived in (7), and Υn-dom represents the aggregate interference (normalized by P) created by all nondominant interferers. Here, the condition Πdom = ∅ indicates that there is no dominant interferer in the network, thereby yielding Υn-dom = Υ under the condition. Now, let us turn to computing the term P(Υn-dom > T d ), which is upper-bounded by     E Υn-dom n-dom P Υ > Td ≤ Td due to the Markov inequality. From the fact that the condition that transmitter i ∈ Πk (k = 1, 2, 3) is a non-dominant interferer is given by hk ri−α ≤ T d (refer to (9)), we have k 

E Υn-dom



⎡ ⎤ ⎢⎢⎢ ⎥⎥⎥ 3  ⎢ ⎥⎥⎥ = E ⎢⎢⎢⎢ hk ri−α ⎥⎦ , k ⎥ ⎣ n-dom

(12)

k=1 Π k

denotes the set of all non-dominant interferers where Πn-dom k in Πk . By letting lik  h−1/α rik , (12) can be rewritten as k ⎡ ⎤ ⎢⎢⎢ ⎥⎥⎥ 3    ⎢ ⎥⎥⎥ E Υn-dom = E ⎢⎢⎢⎢ l−α i ⎥⎦ k ⎥ ⎣ k=1 Πn-dom k  ∞ (13) l−α ldl = 2πλ T d−1/α

=

2πλ (α − 2)T d(2−α)/α

,

where the second equality holds due to the Campbell-Mecke theorem [35] applied to our PPP network. Since P(Πdom = ∅) = 1 − l , using (13) in (12) leads to the upper bound in (11), which completes the proof of the lemma.  Using Lemmas 1 and 2, we are ready to analyze transmission capacity scaling laws for both dense and extended network scenarios as the antenna gain Gm increases. 3.2 Dense Network Scenario In dense networks, we are interested in how to maximally scale the node density λ with increasing Gm (i.e., how many transmission pairs can be activated simultaneously) subject to given outage constraint  and data rate R. The following theorem establishes our first main result in the directional mode of dense networks. Theorem 1. In dense networks, where the spatial node density increases  with Gm , the transmission capacity scales as CT = Θ G4/α m , where α denotes the path-loss exponent. Proof. Under the assumed antenna model (i.e., Gm = Θ(1/θ) and G s = Θ(1)), it follows that f (Gm ) = Θ(1) from (6). Let us focus on deriving an upper bound on the transmission capacity. Using (7) in Lemma 1, we have

IEICE TRANS. COMMUN., VOL.E98–B, NO.11 NOVEMBER 2015

2206

λ T d2/α

= Θ(1).

From this relationship between λ and T d , an upper bound on the maximum node density, λu , is given by     λu = Θ T d2/α = Θ G4/α , m where the second equality holds from (5). Thus, given outage l and data rate R, the transmission capacity is upperbounded by   CT = O(Rλu (1 − l )) = O G4/α . m Now, let us turn to computing a lower bound on the transmission capacity using Lemma 2. Using (7), (11) in Lemma 2 can be rewritten as ⎛ ⎞ ⎛ ⎞ ⎜⎜⎜ ⎟⎟⎟ 1 ⎜⎜⎜ λπ ⎟⎟ 2λπ = exp ⎜⎜⎝ 2/α f (Gm )⎟⎟⎟⎠ . (14) ⎜⎜⎝1 − ⎟⎟ 2/α ⎠ 1 −  u (α − 2)T d Td For α > 2, from the fact that the left hand side (LHS) of (14) scales as Θ(1), it follows that ⎞ ⎛ ⎟⎟ ⎜⎜⎜ λπ exp ⎜⎜⎝ 2/α f (Gm )⎟⎟⎟⎠ = Θ(1), (15) Td which results in

λπ T d2/α

= O(1) using f (Gm ) = Θ(1). Thus, a

lower bound on the maximum allowable node density, λl , is given by     . λl = Θ T d2/α = Θ G4/α m Hence, given outage u and data rate R, the transmission capacity is lower-bounded by CT = Ω G4/α m , which completes the proof of the theorem.   4/α  This scaling result indicates that Θ Gm transmission pairs can be active at the same time in dense networks while maintaining a given outage constraint. It is also examined that the transmission capacity CT is reduced with increasing α. This is because, from Lemma 1, when α increases, the radius dk of the dominant interferers’ disk increases, which yields that the probability that a transmitter becomes a dominant interferer increases. To maintain given an outage probability, the number of active transmission pairs in the network needs to be reduced, thus resulting in a decrement of the node density λ. 3.3 Extended Network Scenario In extended networks, the transmission capacity scaling depends on the common data rate R. The following theorem presents the relationship between the transmission capacity CT and the antenna gain Gm in extended networks. Theorem 2. In extended networks of fixed node density, the transmission capacity scales as CT = Θ(log Gm ).

Proof. From the fact that f (Gm ) = Θ(1), let us first derive an upper bound on the transmission capacity. Under the extended network model, using (7) in Lemma 1 leads to T d2/α = Θ(1), which follows that β = Θ(G2m ) from (5). Thus, an upper bound on the data rate, Ru , is given by     Ru = Θ log(1 + β) = Θ log(1 + G2m ) = Θ(log Gm ). Hence, given l and λ, we obtain CT = O(Ru λ(1 − l )) = O(log Gm ). Next, we focus on computing a lower bound on the transmission capacity. By following the same argument as in the dense network setup (refer to Theorem 1), we can show that (15) also holds for extended networks under the assumption that α > 2 and Gm  1, which thereby results in T d2/α = Θ(1). From the relationship between β and T d in (5), the maximum allowable β is given by β = Θ(G2m ), which reveals that a lower bound on the data rate, Rl , is Rl = Θ(log(1 + β)) = Θ(log Gm ). Hence, given u and λ, it follows that CT = Ω(log Gm ). This completes the proof of the theorem.  From Theorem 2, one can show that the data rate R at each transmission pair can be boosted up to a logarithmic scale in Gm when the outage constraint is satisfied. In extended networks, it is seen that the transmission capacity scaling TC does not depend on α. We also note that this result is the same as the case where there is no interference. Thus, no performance loss occurs compared with an ideal interference-free network as long as scaling law is concerned. 4. Discussion In this section, we first analyze an ideal directional antenna scenario with no sidelobe gain. Then, we perform numerical evaluation to validate the analytical results in Sect. 3. 4.1 No Sidelobe Model For comparison, let us consider an ideal antenna model where there is no sidelobe gain (G s = 0). Then, the mainlobe gain Gm is simply given by Gm = 2π θ . Under the model, the transmission capacity scaling laws are analyzed for both dense and extended network configurations, which are presented in the following two theorems. Theorem 3. Suppose that G s = 0. Then, in dense  networks, the transmission capacity scales as CT = O G2m and C =   Ω G4/α m , where α is the path-loss exponent. Proof. Under the ideal antenna model (i.e., Gm = Θ(1/θ)

DO and SHIN: BEAMWIDTH SCALING IN WIRELESS NETWORKS WITH OUTAGE CONSTRAINTS

2207

  and G s = 0), it follows that f (Gm ) = Θ G4/α−2 from (6). m We first derive an upper bound on the transmission capacity. Similarly as in the proof of Theorem 1, using (7) in Lemma 1, we have λG4/α−2 m T d2/α

= Θ(1),

which yields ⎛ 2/α ⎞   ⎜⎜ T d ⎟⎟⎟ ⎟⎟⎠ = Θ G2m . λu = Θ ⎜⎜⎜⎝ 4/α−2 Gm Thus, given l and R,  the  transmission capacity is upperbounded by CT = O G2m . Now, let us turn to computing a lower bound on the transmission capacity using Lemma 2. From (14), we can find the following two conditions:   λ λ = Θ 4/α = O(1), (16a) T d2/α Gm   λ λ f (G ) = Θ = O(1), (16b) m G2m T 2/α d

where the condition (16a) is obtained since the LHS of (14) scales as Θ(1) for α > 2, and another condition (16b) holds due to (15). Here, the first equalityin (16a) and (16b) comes . Thus, a lower from using (5) and f (Gm ) = Θ G4/α−2 m bound on the maximum allowable node density, λl , that satisfies both conditions in (16) for all values of α > 2 is given by   λl = Θ G4/α . m Hence, given outage u and data rate R, the transmission capacity is lower-bounded by CT = Ω G4/α m , which completes the proof of the theorem.  Theorem 4. Suppose that G s = 0. Then, in extended networks, the transmission capacity scales as CT = Θ(log Gm ). Proof. We first focus on computing a upper bound on the transmission capacity. Using the fact that f (Gm ) =  4/α−2 Θ Gm and (7) in Lemma 1, we have T d2/α = Θ(G4/α−2 ), m which results in β = Θ(Gαm ). Then, an upper bound on the data rate, Ru , is given by   Ru = Θ log(1 + Gαm ) = Θ(log Gm ). Hence, given l and λ, we obtain CT = O(log Gm ). A lower bound on the transmission capacity is also derived similarly as in Theorem 3. From (14), the following two conditions are found:   β 1 = Θ 2 = O(1), (17a) Td Gm

Numerical evaluation of the transmission capacity versus the mainlobe gain Gm for G s  0. Fig. 4

1 T d2/α

 f (Gm ) = Θ

 β2/α = O(1), G2m

(17b)

where the first equality follows due to (5) and f (Gm ) =  4/α−2 Θ Gm . Thus, the maximum allowable β satisfying (17a) and (17b) is lower-bounded by βl = Θ(G2m ), which then yields that a lower bound on the data rate, Rl , is Rl = Ω(log Gm ). Hence, given outage u and intensity λ, the transmission capacity is lower-bounded by CT = Ω(log Gm ), which completes the proof of the theorem.  We remark that, in dense networks, there is a gap between two bounds on the transmission capacity, whereas in extended networks, the result is identical to Theorem 2, which means that the existence of a sidelobe beam does not cause any performance loss in scaling law. 4.2 Numerical Evaluation In this subsection, to validate our analytical results in practical operating regimes (i.e., finite Gm regimes), we perform numerical evaluation via computer simulations. In our

IEICE TRANS. COMMUN., VOL.E98–B, NO.11 NOVEMBER 2015

2208

Fig. 5 Numerical evaluation of the transmission capacity versus the mainlobe gain Gm for G s = 0 (no sidelobe model).

Fig. 6 Numerical evaluation of the transmission capacity versus the path-loss exponent α for Gm = 25.

Monte-Carlo simulation, the interference level in (2) is generated 103 times by placing interfering nodes according to a PPP on R2 . In dense networks, the target SINR threshold β is assumed to be 10 dB, while in extended networks, the node density λ is assumed to be 2.5 × 10−5 nodes/m2 . The transmission capacity is first evaluated with respect to the mainlobe gain Gm in dense and extended networks. The system parameters are summarized in Table 1. In Fig. 4, when there is a nonzero sidelobe gain (i.e., G s  0), both upper and lower bounds on the transmission capacity are shown, respectively, using Lemmas 1 and 2. It is seen that the simulation result (the solid curve) lies between these two bounds. Moreover, the asymptotic result (the dashed curve with no mark) is obtained from Theorems 1 and 2 with a proper bias, and thus only the slope of the curve is relevant. Even if the simulation result slightly vibrates with increasing Gm , it shows overall trends consistent with our asymptotic prediction. In Fig. 5, numerical evaluation of the transmission capacity is performed when there is no sidelobe gain (i.e., G s = 0). Upper and lower bounds on the transmission capacity are shown from Lemmas 1 and 2, respectively. It is obvious to see that the simulation result

(the solid curve) is in-between. The asymptotic result (the dashed curve with no mark) is also obtained from Theorems 3 and 4 with a proper bias. Especially, Fig. 5(a) shows that, in dense networks, the actual transmission capacity is dramatically improved compared to the G s  0 case, due to the absence of sidelobe beam, and tends to scale as G2m . Now, let us turn to numerically show how other system parameters affect the transmission capacity. Numerical evaluation of the transmission capacity is performed in dense and extended networks according to the path-loss exponent α, the per-pair distance r, the outage probability , and the sidelobe gain G s , which is shown in Figs. 6–9, respectively, when Gm = 25 and the parameters in Table 1 are used except for a target parameter. Likewise, it is seen that for each case, the simulation result lies between the corresponding analytical upper and lower bounds. In addition, numerical evaluation is performed under the channel model including shadowing effects. The random shadowing variable is assumed to have log-normal distribution, normalized to have mean one and parameterized by its standard deviation σ expressed in dB scale (i.e., the logarithmic standard deviation), and to be independent across differ-

DO and SHIN: BEAMWIDTH SCALING IN WIRELESS NETWORKS WITH OUTAGE CONSTRAINTS

2209

Fig. 7 Numerical evaluation of the transmission capacity versus the perpair distance r for Gm = 25.

Table 1

System parameters.

Symbol

Description

Value

r  η Gs P W α

Per-pair distance Outage constraint Power noise Sidelobe gain Transmit power Bandwidth path-loss exponent

30 m 0.05 10−9 W/Hz 0.1 20 W 1 GHz 4

ent channel links between two nodes. When Gm = 25 and the parameters in Table 1 are used, the transmission capacity is shown according to the logarithmic standard deviation σ ∈ [0, 15] in Fig. 10. It is obvious to see that the transmission capacity decreases monotonically with σ for both dense and extended networks. To validate the simulation result with path-loss and shadowing effects (the solid curve), the case affected by path-loss only in (1) and (2) (the dashed curve) is also shown in Fig. 10, where both results coincide for σ = 0. It would also be worth to show analytical results (i.e.,

Fig. 8 Numerical evaluation of the transmission capacity versus the outage probability  for Gm = 25.

transmission capacity scaling laws) under the channel model with shadowing effects, which do not seem to be straightforwardly derived. We leave the above issue as our future work. 5. Conclusion In this paper, we have presented the effects of the beamwidth scaling on the transmission capacity in wireless networks with directional antennas. First, the outage analysis for the omnidirectional mode was extended to the directional mode by defining a hybrid antenna model. Under the beamwidth scaling model, the transmission capacity was then analyzed for all path-loss attenuation regimes in both dense and extended networks. Specifically, it turned out that, in dense networks, the transmission capacity scales as G4/α m , whereas, in extended networks, it scales as log Gm . The transmission capacity was also derived for the case where there is no sidelobe gain. Specifically, under no sidelobe model, upper and lower bounds on the transmission capacity scaling were derived in dense networks, and the scaling result in extended networks was shown to be identical to the case where there exists a nonzero sidelobe gain at each node. Our analytical

IEICE TRANS. COMMUN., VOL.E98–B, NO.11 NOVEMBER 2015

2210

Fig. 9 Numerical evaluation of the transmission capacity versus the sidelobe gain G s for Gm = 25.

results were comprehensively validated by computer simulations. Acknowledgment The present research was conducted by the research fund by Dankook University in 2015. References [1] S.P. Weber, X. Yang, J.G. Andrews, and G. de Veciana, “Transmission capacity of wireless ad hoc networks with outage constraints,” IEEE Trans. Inf. Theory, vol.51, no.12, pp.4091–4102, Dec. 2005. [2] S. Weber, J.G. Andrews, and N. Jindal, “An overview of the transmission capacity of wireless networks,” IEEE Trans. Commun., vol.58, no.12, pp.3593–3604, Dec. 2010. [3] J. Andrews, S. Weber, and M. Haenggi, “Ad hoc networks: To spread or not to spread?,” IEEE Commun. Mag., vol.45, no.12, pp.84–91, Dec. 2007. [4] V.K.N. Lau, Y. Chen, and K. Huang, “Spectrum sharing between cellular and mobile ad hoc networks: Transmission-capacity trade-off,” IEEE J. Sel. Areas. Commun., vol.27, no.7, pp.1256–1267, Sept. 2009. [5] N. Jindal, J. Andrews, and S. Weber, “Bandwidth partitioning in decentralized wireless networks,” IEEE Trans. Wireless Commun.,

Fig. 10 Numerical evaluation of the transmission capacity versus the standard deviation σ for Gm = 25.

vol.7, no.12, pp.5408–5419, Dec. 2008. [6] V. Chandrasekhar and J.G. Andrews, “Spectrum allocation in tiered cellular networks,” IEEE Trans. Commun., vol.57, no.10, pp.3059–3068, Oct. 2009. [7] S.P. Weber, J.G. Andrews, X. Yang, and G. de Veciana, “Transmission capacity of wireless ad hoc networks with successive interference cancellation,” IEEE Trans. Inf. Theory, vol.53, no.8, pp.2799–2814, Aug. 2007. [8] J. Blomer and N. Jindal, “Transmission capacity of wireless ad hoc networks: Successive interference cancellation vs. joint detection,” Proc. 2009 IEEE International Conference on Communications, pp.1–5, 2009. [9] N. Jindal, S. Weber, and J.G. Andrews, “Fractional power control for decentralized wireless networks,” IEEE Trans. Wireless Commun., vol.7, no.12, pp.5482–5492, Dec. 2008. [10] S. Weber, J.G. Andrews, and N. Jindal, “The effect of fading, channel inversion, and threshold scheduling on ad hoc networks,” IEEE Trans. Inf. Theory, vol.53, no.11, pp.4127–4149, Nov. 2007. [11] A.M. Hunter, J.G. Andrews, and S. Weber, “Transmission capacity of ad hoc networks with spatial diversity,” IEEE Trans. Wireless Commun., vol.7, no.12, pp.5058–5071, Dec. 2008. [12] N. Jindal, J.G. Andrews, and S. Weber, “Rethinking MIMO for wireless networks: Linear throughput increases with multiple receive antennas,” Proc. 2009 IEEE International Conference on Communications, pp.1–6, 2009. [13] P. Gupta and P.R. Kumar, “The capacity of wireless networks,” IEEE

DO and SHIN: BEAMWIDTH SCALING IN WIRELESS NETWORKS WITH OUTAGE CONSTRAINTS

2211

Trans. Inf. Theory, vol.46, no.2, pp.388–404, March 2000. [14] M. Franceschetti, O. Dousse, D.N.C. Tse, and P. Thiran, “Closing the gap in the capacity of wireless networks via percolation theory,” IEEE Trans. Inf. Theory, vol.53, no.3, pp.1009–1018, March 2007. [15] P. Gupta and P.R. Kumar, “Towards an information theory of large networks: An achievable rate region,” IEEE Trans. Inf. Theory, vol.49, no.8, pp.1877–1894, Aug. 2003. [16] F. Xue, L.-L. Xie, and P.R. Kumar, “The transport capacity of wireless networks over fading channels,” IEEE Trans. Inf. Theory, vol.51, no.3, pp.834–847, March 2005. [17] W.-Y. Shin, S.-Y. Chung, and Y.H. Lee, “Parallel opportunistic routing in wireless networks,” IEEE Trans. Inf. Theory, vol.59, no.10, pp.6290–6300, Oct. 2013. [18] A. El Gamal, J. Mammen, B. Prabhakar, and D. Shah, “Optimal throughput-delay scaling in wireless networks — Part I: The fluid model,” IEEE Trans. Inf. Theory, vol.52, no.6, pp.2568–2592, June 2006. [19] M. Grossglauser and D.N.C. Tse, “Mobility increases the capacity of ad hoc wireless networks,” IEEE/ACM Trans. Netw., vol.10, no.4, pp.477–486, Aug. 2002. [20] V.R. Cadambe and S.A. Jafar, “Interference alignment and degrees of freedom of the K-user interference channel,” IEEE Trans. Inf. Theory, vol.54, no.8, pp.3425–3441, Aug. 2008. [21] S. Yi, Y. Pei, and S. Kalyanaraman, “On the capacity improvement of ad hoc wireless networks using directional antennas,” Proc. 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing — MobiHoc’03, pp.108–116, 2003. [22] J. Zhang and S.C. Liew, “Capacity improvement of wireless ad hoc networks with directional antennae,” SIGMOBILE Mob. Comput. Commun. Rev., vol.10, no.4, pp.17–19, Oct. 2006. [23] B. Liu, Z. Liu, and D. Towsley, “On the capacity of hybrid wireless networks,” IEEE INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1543–1552, 2003. [24] W.-Y. Shin, S.-W. Jeon, N. Devroye, M.H. Vu, S.-Y. Chung, Y.H. Lee, and V. Tarokh, “Improved capacity scaling in wireless networks with infrastructure,” IEEE Trans. Inf. Theory, vol.57, no.8, pp.5088–5102, Aug. 2011. [25] S. Akoum, O.E. Ayach, and R.W. Heath Jr., “Coverage and capacity in mmWave cellular systems,” 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), pp.688–692, 2012. [26] A. Thornburg, T. Bai, and R.W. Heath, Jr, “Performance analysis of mmwave ad hoc networks,” IEEE Trans. Sig. Process., submitted, preprint, [Online]. Avaiable: http://arxiv.org/abs/1412.0765 [27] P. Li, C. Zhang, and Y. Fang, “The capacity of wireless ad hoc networks using directional antennas,” IEEE Trans. Mobile Comput., vol.10, no.10, pp.1374–1387, Oct. 2011. [28] S. Yi, Y. Pei, S. Kalyanaraman, and B. Azimi-Sadjadi, “How is the capacity of ad hoc networks improved with directional antennas?,” Wirel. Netw., vol.13, no.5, pp.635–648, Oct. 2007. [29] H.-N. Dai, K.-W. Ng, R.-W. Wong, and M.-Y. Wu, “On the capacity of multi-channel wireless networks using directional antennas,” Proc. IEEE INFOCOM 2008 — The 27th Conference on Computer Communications, pp.1301–1309, 2008. [30] C. Peraki and S.D. Servetto, “On the maximum stable throughput problem in random networks with directional antennas,” Proc. 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing — MobiHoc’03, pp.76–87, 2003. [31] G. Zhang, Y. Xu, X. Wang, and M. Guizani, “Capacity of hybrid wireless networks with directional antenna and delay constraint,” IEEE Trans. Commun., vol.58, no.7, pp.2097–2106, July 2010. [32] J. Yoon, W.-Y. Shin, and S.-W. Jeon, “Elastic routing in wireless networks with directional antennas,” Proc. 2014 IEEE International Symposium on Information Theory, pp.1001–1005, 2014. [33] J. Wildman, P.H.J. Nardelli, M. Latva-aho, and S. Weber, “On the joint impact of beamwidth and orientation error on throughput in

directional wireless poisson networks,” IEEE Trans. Wireless Commun., vol.13, no.12, pp.7072–7085, June 2014. [34] D.E. Knuth, “Big omicron and big omega and big theta,” ACM SIGACT News, vol.8, no.2, pp.18–24, April-June 1976. [35] M. Haenggi and R.K. Ganti, “Interference in large wireless networks,” Foundations and Trends in Networking, vol.3, no.2, pp.127–248, 2008.

Trung-Anh Do received the B.S. and the M.S. degrees in Telecommunications and Electronics Engineering from Hanoi University of Technology, Hanoi, Vietnam, in 2009 and 2011, respectively. He is now pursuing a Ph.D. degree in Computer Science and Engineering at Dankook University, Yongin, Korea. His research interests include wireless communications and big data analytics.

Won-Yong Shin received the B.S. degree in electrical engineering from Yonsei University, Seoul, Korea, in 2002. He received the M.S. and the Ph.D. degrees in electrical engineering and computer science from Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea, in 2004 and 2008, respectively. From February 2008 to April 2008, he was a Visiting Scholar in the School of Engineering and Applied Sciences, Harvard University, Cambridge, MA. From September 2008 to April 2009, he was with the Brain Korea Institute and CHiPS at KAIST as a Postdoctoral Fellow. From August 2008 to April 2009, he was with the Lumicomm, Inc., Daejeon, Korea, as a Visiting Researcher. In May 2009, he joined Harvard University as a Postdoctoral Fellow and was promoted to a Research Associate in October 2011. Since March 2012, he has been with the Division of Mobile Systems Engineering, College of International Studies and the Department of Computer Science and Engineering, Dankook University, Yongin, Korea, where he is currently an Assistant Professor. His research interests are in the areas of information theory, communications, signal processing, mobile computing, big data analytics, and their applications to multiuser networking issues. Dr. Shin has served as an Associate Editor for the IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS, COMPUTER SCIENCES, for the IEIE TRANSACTIONS ON SMART PROCESSING AND COMPUTING, and for the JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY. He has also served as an Organizing Committee for the 2015 IEEE Information Theory Workshop.

Beamwidth Scaling in Wireless Networks with Outage ...

Nov 11, 2015 - tThe authors are with the Department of Computer Science ...... [20] V.R. Cadambe and S.A. Jafar, “Interference alignment and degrees.

2MB Sizes 0 Downloads 241 Views

Recommend Documents

Improved Capacity Scaling in Wireless Networks With ...
the throughput of wireless networks up to a linear scaling in a variety of network scenarios by using novel techniques such as networks with node mobility [7], ...

Intelligent Jamming in Wireless Networks with ... - CiteSeerX
create a denial of service attack. ... Index Terms—Denial of Service, MAC protocol attacks, .... presented in [1] that showed that wireless networks using TCP.

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
... tends to infinity. This is the best perfor- ...... The next theorem reveals a good property of uniformly ..... 005); National High tech grant of China (2009AA01Z248,.

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
less ad hoc networks with infrastructure support. Mobility and ..... different complete proof of the upper bound is also available in [3]. But our approach is simpler.

Outage Probability of Selection Relaying Networks with ...
Email: [email protected], [email protected]. Vo Nguyen Quoc Bao. Wireless Communication ... incremental relaying, decode-and-forward, Rayleigh fading, out- age probability. I. INTRODUCTION. It is well ... ing techniques at relays, including

Reaching consensus in wireless networks with ...
Email: [email protected]. Anand D. ... Email: [email protected]. Alexandros G. ...... [19] A. D. Sarwate and A. G. Dimakis, “The impact of mobility on gossip.

Reaching consensus in wireless networks with ...
In this paper, the effect of the wireless medium on simple consensus protocol is explored. In a wireless environment, a node's transmission is a broadcast to all ...

Elastic Routing in Wireless Networks With Directional ... - IEEE Xplore
Abstract— Throughput scaling law of a large wireless network equipping directional antennas at each node is analyzed based on the information-theoretic ...

Characterizing Decentralized Wireless Networks with ...
May 24, 2011 - An advantage of this approach is that we do not require stringent assumptions on the fading distribution [8]. The disadvantage of this approach ...

Characterizing Decentralized Wireless Networks with ...
May 24, 2011 - hi(n)Bi(n)ej(φi(n)+θi(n)). (1) where i is the interferer index, ri = Ri are the random distances of active interferers from the receiver, γ is the power pathloss exponent, Bi(n)ejφi(n) are the interferer emissions from interferer i

WIRELESS NETWORKS IN ARCHAEOLOGY AND ...
the whole development of wireless technology from its early origins up to today. .... PDAs to mobile phones, especially 3G phones that, in the meantime, had ...

Evolutionary Games in Wireless Networks
Sep 15, 2009 - ulation(s) as biologist observe, where as in engineering, we can go ... time of convergence of this dynamics that is polynomial in the degree of.

Basic Security in Wireless Networks
that have an antenna for wireless networking will be connect to the Internet and ... default user and password, which is the one that comes written on the quick start ... example, let's assume that the public IP address your Internet provider gave ..

HierHybNET: Capacity scaling of ad hoc networks with ...
networks consisting of both wireless ad hoc nodes and in- frastructure .... 3 It was shown that the HC scheme is order-optimal in a dense network even with ...... cessing, mobile computing, big data analytics, and online social networks analysis.

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Keywords-Ad hoc wireless networks; hybrid wireless net- work; mobility; capacity .... A smaller m represents a more severe degree of clustering and vice versa.

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Jun 24, 2010 - Uniformly Dense Networks. Non-uniformly Dense Networks. Capacity Scaling in Mobile Wireless Ad Hoc. Network with Infrastructure Support.

Scaling RPL to Dense and Large Networks with ...
link stats, RPL info,. IPv6 nbr info. routing protocol, but it has been designed based on data col- lection protocols such as CTP [10]. In application domains such as smart offices and facility management, there may be hundreds, or even thousands, of

Wireless Networks & Security.pdf
What is Wireless LAN? Explain. 5. c. Explain TCP over Wireless network. 4. Page 2 of 2. Main menu. Displaying Wireless Networks & Security.pdf. Page 1 of 2.

Wireless Mesh Networks
networking, internet, VOIP and multimedia streaming and broadcasting. ... The software development platform for multimedia campus networking is based on ...

Performance of Wireless Networks with Hidden Nodes
applicability to predict the performance of IEEE 802.11 networks with hidden nodes. The simulation ..... with service time T. The distribution of qC is therefore well ...

Download Building Wireless Sensor Networks: with ...
with ZigBee, XBee, Arduino, and Processing Full. eBook ... data / command mode which can be used to speed up data operations and touches on the use of Xbee ... Programming the Raspberry Pi, Second Edition: Getting Started with Python.

On Renewable Sensor Networks with Wireless Energy ...
energy could be transferred efficiently from one source coil to one receiver coil via .... and energy dynamics at a sensor node (Section II-D). B. WCV Traveling ...