Ad Hoc Networks 37 (2016) 543–552

Contents lists available at ScienceDirect

Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc

HierHybNET: Capacity scaling of ad hoc networks with cost-effective infrastructure Cheol Jeong a, Won-Yong Shin b,∗ a b

DMC R&D Center, Samsung Electronics, Suwon 443-742, Republic of Korea Department of Computer Science and Engineering, Dankook University, Yongin 448-701, Republic of Korea

a r t i c l e

i n f o

Article history: Received 12 July 2015 Revised 6 October 2015 Accepted 20 October 2015 Available online 28 October 2015 Keywords: Backhaul Capacity scaling Infrastructure

a b s t r a c t In this paper, we introduce a large-scale hierarchical hybrid network (HierHybNET) consisting of both n wireless ad hoc nodes and m base stations (BSs) equipped with l multiple antennas per BS, where the communication takes place from wireless nodes to a remote central processor (RCP) through BSs in a hierarchical way. To understand a relationship between capacity and cost, we deal with a general scenario where m, l, and the backhaul link rate can scale at arbitrary rates relative to n (i.e., we introduce three scaling parameters). In order to provide a cost-effective solution for the deployment of backhaul links connecting BSs and the RCP, we first derive the minimum backhaul link rate required to achieve the same capacity scaling law as in the infinite-capacity backhaul link case. Assuming an arbitrary rate scaling of each backhaul link, a generalized achievable throughput scaling law is then analyzed. Moreover, three-dimensional information-theoretic operating regimes are explicitly identified according to the three scaling parameters. We also characterize an infrastructure-limited regime where the throughput is limited by the backhaul link rate. © 2015 Elsevier B.V. All rights reserved.

1. Introduction 1.1. Related work Gupta and Kumar’s pioneering work [1] introduced and characterized the sum throughput scaling law in a large wireless ad hoc network. For the network having n nodes randomly distributed in a unit area, it was  shown in [1] that the aggregate throughput scales as ( n/ log n).1 This throughput scaling is achieved by the nearest-neighbor multihop (MH) routing strategy. In [3–5], MH schemes were



Corresponding author. Tel.: +82 31 8005 3253. E-mail addresses: [email protected] (C. Jeong), [email protected]. kr (W.-Y. Shin). 1 We use the following notation: (i) f (x) = O(g(x)) means that there exist constants C and c such that f(x) ≤ Cg(x) for all x > c, (ii) f (x) = (g(x)) if g(x) = O( f (x)), (iii) f (x) = ω(g(x)) means that limx→∞ gf ((xx)) = 0, and (iv) f (x) = (g(x)) if f (x) = O(g(x)) and g(x) = O( f (x)) [2].

http://dx.doi.org/10.1016/j.adhoc.2015.10.006 1570-8705/© 2015 Elsevier B.V. All rights reserved.

further developed and analyzed in the network, while their average throughput per source–destination (S–D) pair scales far slower than (1)—the total throughput scaling was im√ proved to ( n) by using percolation theory [3]; the effect of multipath fading channels on the throughput scaling was studied in [4]; and the tradeoff between power and delay was examined in terms of scaling laws in [5]. Together with the studies on MH, it was shown that a hierarchical cooperation (HC) strategy [6,7] achieves an almost linear throughput scaling, i.e., (n1− ) for an arbitrarily small  > 0, in dense networks of unit area. As alternative approaches to achieving a linear scaling, novel techniques such as networks with node mobility [8], interference alignment [9,10], directional antennas [11–13], and infrastructure support [14] have been proposed. Since long delay and high cost of channel estimation are needed in ad hoc networks with only wireless connectivity, the interest in study of more amenable networks using infrastructure support has greatly been growing. Such hybrid

544

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

networks consisting of both wireless ad hoc nodes and infrastructure nodes, or equivalently base stations (BSs), have been introduced and analyzed in [14–18]. In a hybrid network where the number of antennas at each BS can scale at an arbitrary rate relative to the number of wireless nodes, the optimal capacity scaling was characterized by introducing two new routing protocols, termed infrastructuresupported single-hop (ISH) and infrastructure-supported multihop (IMH) protocols [18]. In the ISH protocol, all wireless source nodes in each cell communicate with its belonging BS using either a single-hop multiple-access or a singlehop broadcast. In the IMH protocol, source nodes in each cell communicate with its belonging BS via the nearest-neighbor MH routing.2 In hybrid networks with ideal infrastructure [14–18], BSs have been assumed to be interconnected by infinite-capacity wired links. In large-scale ad hoc networks, it is not costeffective to assume a long-distance optical fiber for all BSto-BS backhaul links. In practice, since the backhaul link rate becomes an important factor to determine a cost of operators when the infrastructure is deployed, it is rather meaningful to consider a cost-effective finite-rate backhaul link between BSs. One natural question is what are the fundamental capabilities of hybrid networks with rate-limited backhaul links in supporting n nodes that wish to communicate concurrently with each other. To in part answer this question, the throughput scaling was studied in [20,21] for a simplified hybrid network, where BSs are connected only to their neighboring BSs via a finite-rate backhaul link—lower and upper bounds on the throughput were derived in oneand two-dimensional networks. However, in [20,21], the system model under consideration is comparatively simplified, and the form of achievable schemes is limited only to MH routings. In [22], a general hybrid network deploying multiantenna BSs was studied in fundamentally analyzing how much rate per BS-to-BS link is required to guarantee the optimal capacity scaling achieved for the infinite-capacity backhaul link scenario [18]. More practically, packets arrived at a certain BS in a radio access network (RAN) are delivered to a core network (CN) in a hierarchical way, and then are transmitted from the CN to other BSs in the RAN, while neighboring BSs have an interface through which only signaling information is exchanged between them [23]. The hierarchical hybrid network (HierHybNET) operating based on a remote central processor (RCP) to which all BSs are connected is well suited to this realistic scenario [24–28]. In [27], the set of BSs connected to the RCP via limited-capacity backhaul links was adopted in studying the performance of cooperative cellular systems using Wyner-type models. An achievable rate for the uplink channel of such a network model was analyzed using a joint multi-cell processing. To the best of our knowledge, characterizing an information-theoretic capacity scaling law of large hybrid networks (i.e., more general version than the Wyner-type model) with finite-capacity backhaul links in the

2 Note that the performance analysis is performed by assuming that the number of antennas at each BS may tend to infinity. In practice, however, the number of antennas that can be deployed at each BS may be limited due to the limited size of each BS. Nevertheless, we can obtain valuable insights even for a finite-size system from the large-system analysis [19].

presence of the RCP has never been conducted before in the literature. 1.2. Main contributions In this paper, we introduce a more general HierHybNET with unit node density (i.e., an extended HierHybNET), consisting of n wireless ad hoc nodes, multiple BSs equipped with multiple antennas, and one RCP, in which wired backhaul links between the BSs and the RCP are rate-limited. This new type of network, consisting of multiple nodes, multiple BSs, and one RCP, was originally introduced in [29] by the same authors. In this paper, with detailed descriptions and proofs, we completely establish our main theorem in which the minimum backhaul link rate required to achieve the same capacity scaling law as in the infinite-capacity backhaul link case is derived. To understand a fundamental relationship between capacity and cost, we take into account a general scenario where three scaling parameters of importance including (i) the number of BSs, (ii) the number of antennas at each BS, and (iii) each backhaul link rate can scale at arbitrary rates relative to n. Inspired by the achievability result in [18], for our achievable scheme, we use one of pure MH, HC, and two different infrastructure-supported routing protocols. Our network model is well-suited for the cloud RAN (CRAN) that has recently received a lot of attention as some functionalities of the BSs are moved to a central unit [30]. However, the usefulness of the C-RAN may be limited due to high CAPEX (capital expenditures) as well as high OPEX (operational expenditures) associated with high backhaul costs. That is, in our problem setup, the cost is referred to as the expenditures that are costed only by designing backhaul links. It is thus vital to significantly dimension the backhaul bandwidth (or equivalently, the backhaul capacity) to reduce the cost of operators while guaranteeing the optimal throughput. In this regard, our results present a costeffective approach for the deployment of backhaul links. We first derive the minimum rate of a BS-to-RCP link (or equivalently, an RCP-to-BS link) required to achieve the same capacity scaling law as in the HierHybNET with infinite-capacity infrastructure. Assuming an arbitrary rate scaling of each backhaul link, we then analyze a new achievable throughput scaling law. Moreover, we identify three-dimensional informationtheoretic operating regimes explicitly according to the aforementioned three scaling parameters. Besides the fact that extended networks of unit node density are fundamentally power-limited [31], we are interested in further finding the case for which our network, having a power limitation, is in the infrastructure-limited regime, where the performance is limited by the rate of backhaul links. In other words, in such an infrastructure-limited regime, the throughput can be improved by increasing the backhaul link rate (i.e., investing more in backhaul infrastructure). The infrastructurelimited regime in a HierHybNET has never been characterized before in the literature. From our results, one can know when the network throughput can be improved by increasing the backhaul link rate. We thus characterize these qualitatively different regimes according to the three scaling parameters.

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

545

Fig. 1. The HierHybNET with limited backhaul link rate RBS between a BS and an RCP.

1.3. Organization The rest of this paper is organized as follows. The system and channel models are described in Section 2. In Section 3, the routing protocols with and without infrastructure support are presented and their transmission rates are shown. In Section 4, the minimum required backhaul link rate is derived, a generalized achievable throughput scaling is analyzed, and then operating regimes are identified. Finally, Section 5 summarizes our paper with some concluding remarks. 2. System and channel models In an extended HierHybNET of unit node density, n nodes are uniformly and independently distributed on a square of area n, except for the area where BSs are placed.3 We randomly pick S–D pairings, so that each node acts as a source and has exactly one corresponding destination node. Assume that the BSs are neither sources nor destinations. As illustrated in Fig. 1, the network is divided into m square cells of equal area, where a BS with l antennas is located at the center of each cell. The total number of BS antennas in the network is assumed to scale at most linearly with n, i.e., ml = O(n).4 √ It is assumed that the radius of each BS scales as 0 n/m, where  0 > 0 is an arbitrarily small constant independent of n, m, and l. This radius scaling would ensure enough separation among the antennas since per-antenna distance scales (at least) as the average per-node distance (1) for any parameters n, m, and l. If the radius scaling scales slower 3 It was shown that the HC scheme is order-optimal in a dense network even with infrastructure [18]. In other words, the infrastructure is not helpful in improving the capacity in a dense network. Hence, in our paper, we will consider an extended network only. 4 Note that this antenna scaling is feasible due to the massive multipleinput multiple-output (MIMO) (or large-scale MIMO) technology where each BS is equipped with a very large number of antennas, which has recently received a lot of attention.

than (1), then per-antenna distance may become vanishingly small, which is undesirable under our infrastructuresupported routing protocols. The antenna configuration basically follows that of [18,22,32]. According to the radius scaling of each BS, the antennas of each BS are placed as follows: √ √ 1. If l = w( n/m) and l = O(n/m), then n/m antennas are regularly placed on the BS boundary and the remaining antennas are uniformly placed inside the boundary. √ 2. If l = O( n/m), then l antennas are regularly placed on the BS boundary. Such an antenna deployment guarantees both the nearest neighbor transmission around the BS boundary and the enough spacing between the antennas of each BS. If antennas are uniformly placed inside the BS boundary, then the transmission rate may be reduced due to a relatively long hop distance between an antenna and the nearest neighbor node. We thus need to place the BS antennas first on the BS boundary. This antenna configuration will be widely used for future massive MIMO systems. For analytical convenience, we assume that the parameters n, m, and l are related according to

n = m1/β = l 1/γ , where β , γ ∈ [0, 1) with a constraint β + γ ≤ 1. This constraint is reasonable since the total number of antennas of all BSs deployed over the network does not need to be greater than the number of nodes in the network. As depicted in Fig. 1, it is assumed that all the BSs are fully interconnected by wired links through one RCP. Without loss of generality, it is assumed that the RCP is located at the center of the network. The packets transmitted from BSs are received at the RCP and are then conveyed to the corresponding BSs. In the previous studies [14–18], the rate of backhaul links has been assumed to be unlimited so that the links are not a bottleneck when packets are transmitted from one cell to another. In practice, however, it is natural for each backhaul link to have a finite capacity that may limit the

546

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

Fig. 2. The ISH protocol. Each square represents a cell in the HierHybNET.

transmission rate of infrastructure-supported routing protocols. In this paper, we assume that each BS is connected to one RCP through an errorless wired link with finite rate RBS = nη for η ∈ (−∞, ∞). It is also assumed that the BS-toRCP or RCP-to-BS link is not affected by interference. The uplink channel vector between node i and BS b is jθ

(u)

( u)



( u)

bi,1 e bi,2 denoted by hbi = [ e(u)α , ,..., /2 (u)α /2 r

bi,1

r

bi,2

( u) jθ e bi,l ]T , ( u)α /2 r bi,l

where the super-

(u)

script T denote the transpose and θbi,t represents the random phases uniformly distributed over [0, 2π ) based on a far-field assumption, which is valid if the wavelength is sufficiently (u) small [3,18]. Here, rbi,t denotes the distance between node i and the tth antenna of BS b, and α > 2 denotes the path-loss exponent. The downlink channel vector between BS b and jθ

(d)

(d )



(d )

ib,1 e ib,2 , ,..., node i is similarly denoted by hib = [ e(d)α /2 (d)α /2 r

ib,1

r

ib,2

(d ) jθ e ib,l ( d)α /2 r ib,l

].

For the uplink-downlink balance, it is assumed that each BS satisfies an average transmit power constraint nP/m, while each node satisfies an average transmit power constraint P. Then, the total transmit power of all BSs is the same as the total transmit power consumed by all wireless nodes. This assumption is based on the same argument as duality connection between multiple access channel (MAC) and broadcast channel (BC) in [33]. Suppose that each source transmits with the same average transmission rate Rn . The total throughput of the network is then defined as Tn (α , β , γ , η) = nRn and its scaling expolog Tn (α ,β ,γ ,η) 5 nent is given by e(α , β , γ , η) = limn→∞ . log n 3. Routing protocols with and without infrastructure support In this section, for better readability of the paper, routing protocols with and without infrastructure support are illuminated. 3.1. Routing protocols with infrastructure support The routing protocols supported by BSs having multiple antennas in [18] are described with slight modification. In infrastructure-supported routing protocols, the packet of a source is delivered to the corresponding destination of the 5 To simplify notations, Tn (α , β , γ , η) will be written as Tn if dropping α , β , γ , and η does not cause any confusion.

source using three stages: access routing, backhaul transmission, and exit routing. According to the transmission scheme in access and exit routings, the infrastructure-supported routing protocols are categorized into two different protocols as in the following. There are n/m nodes with high probability (whp) in each cell, which can be proved by slightly modifying the proof of [6, Lemma 4.1]. The ISH protocol is illustrated in Fig. 2 and each stage for the ISH protocol is described as follows. • For the access routing, all source nodes in each cell transmit their packets simultaneously to the home-cell BS via single-hop multiple-access. • The packets of source nodes are then jointly decoded at the BS, assuming that the signals transmitted from the other cells are treated as noise. • In the next stage, the decoded packets are transmitted from the BS to the RCP via BS-to-RCP link. • The packets received at the RCP are conveyed to the corresponding BS via RCP-to-BS link. • For the exit routing, each BS in each cell transmits n/m packets received from the RCP, via single-hop broadcast to all the wireless nodes in its cell. Since the extended network is fundamentally powerlimited, the ISH protocol may not be effective especially when the node–BS distance is quite long, which motivates us to introduce the IMH protocol. The IMH protocol is illustrated in Fig. 3 and each stage for the IMH protocol is described as follows. • Each cell is further divided into smaller square cells of √ area 2log n, so-called routing cells. Since min{l, n/m} antennas are regularly placed on the BS boundary, √ min{l, n/m} MH paths can be created simultaneously in each cell. • For the access routing, the antennas placed only on the BS boundary can receive the packets transmitted from one of the nodes in the nearest-neighbor routing cell. Draw a line connecting a source to one of the antennas of its BS and perform MH routing horizontally or vertically by using the adjacent routing cells passing through the line until its packets reach the corresponding receiver (antenna). • The BS-to-RCP and RCP-to-BS transmission is the same as the ISH protocol case. • For the exit routing, each antenna on the BS boundary transmits the packets to one of the nodes in the nearestneighbor routing cell via MH transmission.

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

547

Fig. 3. The IMH protocol. Each square represents a cell in the HierHybNET.

3.2. Routing protocols without infrastructure support Using one of the MH transmission [1] and the HC strategy [6] may be beneficial in terms of improving the achievable throughput scaling when m and l are small. 3.3. The transmission rates of routing protocols In this section, we show how much transmission rates are obtained via wireless links between ad hoc nodes and homecell BSs for each infrastructure-supported routing protocol. We remark that the transmission rates in both access and exit routings are irrelevant to the rate of backhaul links and thus are essentially the same as the infinite-capacity backhaul link case [18]. The transmission rates of each routing protocol are given in the following lemma. Lemma 1 [18]. In the hybrid network of unit node density, the transmission rates of the ISH and IMH protocools in each cell α /2−1 ) and for both access and exit routing are given by (l ( m n) n 1/2− ( min{l, ( m ) }), respectively. The total throughput scaling laws achieved by the MH and HC protocols that utilize no infrastructure were derived in [1] and [6], respectively, and are given as follows: Tn,MH =

Fig. 4. The operating regimes on the achievable throughput scaling with respect to β and γ for η → ∞.

(n1/2− ) and Tn,HC = (n2−α /2− ) where  > 0 is an arbi-

4.1. Two-dimensional operating regimes with infinite-capacity infrastructure

4. Achievability result

The optimal capacity scaling was derived in [18] for hybrid networks with no RCP when the rate of each BS-to-BS link is unlimited. Although our HierHybNET characterized in the presence of RCP differs from the network model in [18], the existing analytical results, including the optimal capacity scaling and information-theoretic operating regimes, can be straightforwardly applied to our network setup for the infinite-capacity backhaul link case, i.e., η → ∞. As illustrated in Fig. 4, when η → ∞, two-dimensional operating regimes with respect to β and γ are divided into four sub-regimes. To be specific, the best strategy among the four schemes ISH, IMH, MH, and HC depends on the path-loss exponent α and the two scaling parameters β and γ under the network, and the regimes at which the best achievable throughput is determined according to the value of α synthetically constitute our operating regimes. The best scheme and its corresponding scaling exponent e(α , β , γ , ∞) in each regime are summarized in Table 1. For details about the regimes, see [18].

trarily small constant.

In this section, we first introduce information-theoretic two-dimensional operating regimes with respect to the number of BSs and the number of antennas per BS (i.e., the scaling parameters β and γ ) for the infinite-capacity backhaul link scenario. We then derive the minimum rate of each backhaul link, required to achieve the optimal capacity scaling, according to the two-dimensional operating regimes. Assuming that the rate of each backhaul link scales at an arbitrary rate relative to n, we characterize a new achievable throughput scaling, which generalizes the existing achievability result in [18] under the HierHybNET model. The infrastructure-limited regime in which the throughput scaling is limited by the rate of finite-capacity backhaul links is also identified. Furthermore, we closely scrutinize our achievability result according to the three-dimensional operating regimes identified by introducing a new scaling parameter η.

548

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

Table 1 Achievability result for an extended HierHybNET with infinitecapacity infrastructure [18]. Regime

Condition

Scheme

2<α<3 α≥3

HC MH

2 − α2

B

2 < α < 4 − 2β − 2γ α ≥ 4 − 2β − 2γ

HC IMH

2 − α2 β +γ

C

2<α <3−β α ≥3−β

HC IMH

2 − α2

HC

2 − α2

D

2<α< 2(1−γ )

β

β

≤α <1+

α ≥1+

2γ 1−β

2γ 1−β

ISH IMH

n

e(α , β , γ , ∞)

A

2(1−γ )

nodes among n/m nodes in each cell transmit packets using the IMH protocol, the transmission rate of each activated S– T T 1√ 1√ . Note = n,IMH D pair is given by n,IMH n m

n m}

min{l,

min{l,

n m}

that under the IMH protocol, the number of S–D pairs that transmit  packets simultaneously through each backhaul link n }. Hence, in Regimes B, C, and D, the minimum is min{l, m required rate of each backhaul link to guarantee the throughput Tn, IMH , denoted by CBS, IMH , is given by

1 2

1+β 2

CBS,IMH =

β) 1 + γ − α(1− 2

Tn,IMH m



 1/2−  n

=  min l,

 (l )  1/2−

=  mn

1+β 2

4.2. The minimum required rate of backhaul links The supportable transmission rate of the backhaul link between BSs and the RCP may increase proportionally with the cost that one needs to pay, thus resulting in a very high cost of CAPEX and OPEX especially in a large-scale HierHybNET. In order to give a cost-effective backhaul solution, we would like to analyze the minimum rate scaling of each backhaul link required to achieve the same capacity scaling law as in the infinite-capacity backhaul link case. It is assumed that the value of α is not perfectly known to network operators while the values of β and γ are known a priori when the backhaul link of our HierHybNET is designed. Thus, the minimum required rate of each backhaul link is derived by taking into account all the possible values of α . According to the two-dimensional operating regimes in Fig. 4, the required rate of each BS-to-RCP link (or each RCP-to-BS link), denoted by CBS , is derived in the following theorem. Theorem 1. The minimum rate of each backhaul link required to achieve the optimal capacity scaling of our HierHybNET with infinite-capacity infrastructure is given by

⎧ 0 for Regime A ⎪ ⎪ ⎪ ⎪ ⎪  l for Regime B ⎨ ( )

 1/2− CBS =  mn for Regime C ⎪ ⎪ ⎪ 

⎪  ⎪ ⎩ l m logm (n/l)−1 for Regime D n

m

for an arbitrarily small constant  > 0. The associated operating regimes with respect to β and γ are illustrated in Fig. 4. Proof. The required rate of each backhaul link is determined by the multiplication of the number of S–D pairs that transmit packets simultaneously through each link and the transmission rate of the infrastructure-supported routing protocols for each S–D pair. From Table 1, no infrastructuresupported protocol is needed in Regime A to achieve the optimal capacity scaling, thereby resulting in CBS = 0 in the regime. Let us first focus on the IMH protocol, which is used in Regimes B, C, and D when α is greater than 2γ or equal to 4 − 2β − 2γ , 3 − β , and 1 + 1−β , respectively

(see Table 1). Let Tn, IMH denote the aggregate throughput achieved by the IMH protocol when the rate of each backhaul link is unlimited. Then, from Lemma 1, it follows that √ n 1/2− ) }). Since only min{l, n/m} Tn,IMH = (m min{l, ( m

for Regime B for Regimes C and D,

(3)

which is the same as CBS in Regimes B and C since only the IMH protocol out of the two infrastructure-supported protocols is used in these regimes. Now, let us turn to the ISH pro2(1−γ ) 2γ ≤ α < 1 + 1−β tocol, which is used in Regime D when β

(see Table 1). Let Tn, ISH denote the aggregate throughput achieved by the ISH protocol when the rate of each backhaul link is unlimited. Then, from Lemma 1, it follows that α /2−1 ). Since each S–D pair transmits at a Tn,ISH = (ml ( m n) rate Tn, ISH /n and the number of S–D pairs that transmit packets simultaneously through each link is n/m, the minimum required rate of each backhaul link for a given α to guarantee the throughput Tn, ISH , denoted by CBS, ISH , is given by

CBS,ISH =

Tn,ISH m

 α/2−1  m

= l

n

.

(4)

Since either the ISH or IMH protocol can be used according to the value of α in Regime D, we should compare the required rates of backhaul links for both protocols. Let us find the minimum required rate CBS with which max {Tn, IMH , Tn, ISH } can be guaranteed for all α . Using (2) and (3), in Regime D, we have



(2)

m

CBS =  max

 1/2−  (1−γ )/β −1  n m m

,l

 (1−γ )/β −1  m

= l

n

n

 log (n/l)−1  m m

= l

n

,

where the second equality holds since γ ≥ 12 (β 2 − 3β + 2) for Regime D. Therefore, the minimum required rate of each backhaul link, CBS , is finally given by (1), which completes the proof of Theorem 1.  This result indicates that a judicious rate scaling of the BS-to-RCP link (or the RCP-to-BS link) under a given operating regime leads to the order optimality of our HierHybNET along with cost-effective backhaul links. Next, we show the minimum of the aggregate backhaul link rate, which is defined as the sum of the required backhaul link rates coming from all BS-to-RCP links (or RCP-to-BS links) and is denoted by CRCP . Corollary 1. The minimum of the aggregate backhaul link rate required to achieve the optimal capacity scaling of our HierHybNET with infinite-capacity infrastructure is given by

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

⎧ 0 for Regime A ⎪ ⎪ ⎪ ⎪ ⎪ for Regime B ⎨(ml ) CRCP =  nm 1/2 n− for Regime C ( ) ⎪ ⎪  ⎪

⎪  ⎪ ⎩ ml mn logm (n/l)−1 for Regime D

Table 2 Achievability result for an extended HierHybNET with finite-capacity infras˜ tructure (− 1 ≤ η < 1 for Regime B˜ and 0 ≤ η < 1 for Regime D). 2

(4)

for an arbitrarily small constant  > 0. The associated operating regimes with respect to β and γ are illustrated in Fig. 4. The above result is straightforwardly obtained by using Theorem 1. From Corollary 1, it is shown that a lower bound on CRCP is (n1/2 ) in Regimes B and C while it is (n) in Regime D. Note that CRCP is minimized when β + γ = 12 in Regime B or β = 0 in Regime C. 4.3. Generalized achievable throughput scaling and operating regimes If the rate of each backhaul link, RBS , is greater than or equal to the minimum required rate CBS in Theorem 1, then the achievable throughput scaling Tn in the HierHybNET with finite-capacity infrastructure is the same as the infinitecapacity infrastructure backhaul link scenario. Otherwise, Tn will be decreased accordingly depending on the operating regimes for which the infrastructure-supported routing protocols are used. In order to better understand a relationship between capacity and cost, we generalize the achievable throughput scaling by introducing an arbitrary rate scaling of each BS-to-RCP or RCP-to-BS link (or with the scaling parameter η ∈ (−∞, ∞)). The three-dimensional operating regimes with respect to the number of BSs, m, the number of antennas per BS, l, and the backhaul link rate, RBS , are also identified. We start from establishing the following theorem. Theorem 2. In the HierHybNET with the backhaul link rate RBS , the aggregate throughput Tn scales as

 α/2−1 m  max min max ml , n



n min ml, m m

1/2−

, mRBS , n

 1/2−

,n

2−α /2−

, (5)

where  > 0 is an arbitrarily small constant. Proof. When the rate of each backhaul link is limited by RBS , from Lemma 1, the aggregate rates achieved using the ISH and IMH protocols are given by



 α/2−1 m

Tn,ISH =  min ml and





n



, mRBS

 n 1/2−

Tn,IMH =  min ml, m

m

 , mRBS

549

,

respectively, where mRBS represents the maximum supportable rate of backhaul links over the whole network, which completes the proof of the theorem.  We first remark that one more term mRBS is included in (5) compared to [18, Theorem 4]. Moreover, in the network

2

Regime

Condition

Scheme

e(α , β , γ , η)



2 < α < 4 − 2β − 2η α ≥ 4 − 2β − 2η

HC IMH

2 − α2 β +η

˜ D

2 < α < 4 − 2β − 2η −η) 4 − 2β − 2η ≤ α < 2 + 2(γ 1−β −η) 2γ 2 + 2(γ ≤ α < 1 + 1−β 1−β

HC ISH

2 − α2 β +η

α ≥1+

2γ 1−β

ISH IMH

β) 1 + γ − α(1− 2 1+β 2

with rate-limited infrastructure, either the MH and HC protocol may outperform the infrastructure-supported protocols even under certain operating regimes such that using either the ISH or IMH protocol leads to a better throughput scaling for the rate-unlimited infrastructure scenario. This is because the throughput achieved by the ISH and IMH protocols can be severely degraded when the rate RBS becomes the bottleneck. Note that our extended network is fundamentally powerlimited [6]. It is also worth noting that the network may have an infrastructure limitation. In the infrastructure-limited regime, the performance is limited by the rate of backhaul links. In the following remark, we show the case where our network has such fundamental limitation (the term  is omitted for notational convenience). Remark 1 (Infrastructure-limited regimes). Let us introduce the infrastructure-limited regime where the performance is limited by the backhaul link rate RBS ; that is, we show the case where the backhaul links become a bottleneck. In the infrastructure-limited regime, either the ISH or IMH protocol outperforms the other schemes while its throughput scaling exponent depends on η. Two new operating regimes B˜ and ˜ causing an infrastructure limitation for some α are idenD ˜ become tified in Table 2. More specifically, Regimes B˜ and D infrastructure-limited when α ≥ 4 − 2β − 2η and 4 − 2β − 2(γ −η) ˜ the IMH pro2η ≤ α < 2 + 1−β , respectively. In Regime B, 6 ˜ the tocol is dominant when α ≥ 4 − 2β − 2η. In Regime D, following interesting observations are made according to the values of α : • (High path-loss attenuation regime): if α ≥ 2 +

2(γ −η) , 1−β

then the network using the ISH and IMH protocols is limited by the access and exit routings (but not by the backhaul transmission), and thus achieves the same throughput as that in Regime D. • (Medium path-loss attenuation regime): if 4 − 2β − 2η ≤ −η) α < 2 + 2(γ , then the network using the ISH proto1−β

col is limited by the backhaul transmission but achieves a higher throughput than that of pure ad hoc routings, which is thus in the infrastructure-limited regime. The network using the IMH protocol is not limited by the backhaul transmission, and thus its throughput scaling exponent is always less than β + η. • (Low path-loss attenuation regime): if α < 4 − 2β − 2η, then neither the ISH nor IMH protocol can outperform the 6 ˜ the network using the ISH protocol is For some portions in Regime B, also limited by the backhaul transmission, leading to the same throughput scaling exponent β + η as the IMH protocol case.

550

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

Fig. 5. The operating regime with respect to β and γ , where η < − 12 .

Fig. 6. The operating regimes with respect to β and γ , where − 12 ≤ η < 0.

HC strategy since a long-range MIMO transmission of the HC yields a significant gain for small α . If η is too small, then some portions in Regimes B, C, and D may turn into Regime A, where the pure ad hoc protocols outperform the infrastructure-supported protocols, which will be specified later. In these regimes, the throughput scaling is not improved even with increasing η, and thus the network is not infrastructure-limited. In Regimes B, C, and D, the infrastructure-supported protocols can achieve their maximum throughput, which is the same as the infinite-capacity backhaul link case, since η is sufficiently large. Hence, these three regimes are not fundamentally infrastructure-limited. The two-dimensional operating regimes specified by β and γ in Fig. 4 can be extended to three-dimensional operating regimes by introducing a new scaling parameter η, where

RBS = nη for η ∈ (−∞, ∞). Since the three-dimensional operating regimes cannot be straightforwardly illustrated and even a three-dimensional representation does not lead to any insight into our analytically intractable network model, we identify the three-dimensional operating regimes by introducing five types of two-dimensional operating regimes, showing different characteristics, with respect to β and γ according to the values of η. Remark 2 (Three-dimensional operating regimes). The operating regimes with respect to β and γ are plotted in Figs. 5–8 for η < −1/2, −1/2 ≤ η < 0, 0 ≤ η < 1/2, and 1/2 ≤ η < 1, respectively. In these figures, the infrastructurelimited regimes are marked with a shaded area. From Theorem 2, the operating regimes in Figs. 5–8 can be easily described.

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

551

HC. Three-dimensional operating regimes were also explicitly identified according to the three scaling parameters. In particular, we studied the case where our network is fundamentally infrastructure-limited. Acknowledgment This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A1A2054577). This paper was presented in part at the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, June/July 2014. References

Fig. 7. The operating regimes with respect to β and γ , where 0 ≤ η <

Fig. 8. The operating regimes with respect to β and γ , where

1 2

1 . 2

≤ η < 1.

5. Conclusion A generalized achievable throughput scaling law was characterized for a HierHybNET assuming an arbitrary rate scaling of backhaul links. The minimum required rate of each backhaul link was first derived to guarantee the optimal capacity scaling along with a cost-effective backhaul solution. Provided that three scaling parameters (i.e., the number of BSs, m, and the number of antennas at each BS, l, the rate of each backhaul link, RBS ) scale at arbitrary rates relative to the number of wireless nodes, n, a generalized achievable throughput scaling was then derived based on using one of the two infrastructure-supported routing protocols, ISH and IMH, and the two ad hoc routing protocols, MH and

[1] P. Gupta, P.R. Kumar, The capacity of wireless networks, IEEE Trans. Inf. Theory 46 (2000) 388–404. [2] D.E. Knuth, Big omicron and big omega and big theta, ACM Spec. Interest Group Algorithms Comput. Theory News 8 (1976) 18–24. [3] M. Franceschetti, O. Dousse, D.N.C. Tse, P. Thiran, Closing the gap in the capacity of wireless networks via percolation theory, IEEE Trans. Inf. Theory 53 (2007) 1009–1018. [4] W.-Y. Shin, S.-Y. Chung, Y.H. Lee, Parallel opportunistic routing in wireless networks, IEEE Trans. Inf. Theory 59 (2013) 6290–6300. [5] A.E. Gamal, J. Mammen, B. Prabhakar, D. Shah, Optimal throughputdelay scaling in wireless networks. Part I: the fluid model, IEEE Trans. Inf. Theory 52 (2006) 2568–2592. [6] A. Özgür, O. Lévêque, D.N.C. Tse, Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks, IEEE Trans. Inf. Theory 53 (2007) 3549–3572. [7] U. Niesen, P. Gupta, D. Shah, The balanced unicast and multicast capacity regions of large wireless networks, IEEE Trans. Inf. Theory 56 (2010) 2249–2271. [8] M. Grossglauser, D.N.C. Tse, Mobility increases the capacity of ad hoc wireless networks, IEEE/ACM Trans. Netw. 10 (2002) 477–486. [9] V.R. Cadambe, S.A. Jafar, Interference alignment and degrees of freedom of the K-user interference channel, IEEE Trans. Inf. Theory 54 (2008) 3425–3441. [10] U. Niesen, Interference alignment in dense wireless networks, IEEE Trans. Inf. Theory 57 (2011) 2889–2901. [11] S. Yi, Y. Pei, S. Kalyanaraman, B. Azimi-Sadjadi, How is the capacity of ad hoc networks improved with directional antennas? Wirel. Netw. 13 (2007) 635–648. [12] P. Li, C. Zhang, Y. Fang, The capacity of wireless ad hoc networks using directional antennas, IEEE Trans Mob. Comput. 10 (2011) 1374– 1387. [13] J. Yoon, W.-Y. Shin, S.-W. Jeon, Elastic routing in wireless networks with directional antennas, in: Proceedings of IEEE International Symposium on Information Theory (ISIT), 2014, pp. 1001–1005. [14] A. Zemlianov, G. de Veciana, Capacity of ad hoc wireless networks with infrastructure support, IEEE J. Select. Areas Commun. 23 (2005) 657– 667. [15] O. Dousse, P. Thiran, M. Hasler, Connectivity in ad-hoc and hybrid networks, in: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), 2002, pp. 1079–1088. [16] U.C. Kozat, L. Tassiulas, Throughput capacity of random ad hoc networks with infrastructure support, in: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), 2003, pp. 55–65. [17] B. Liu, P. Thiran, D. Towsley, Capacity of a wireless ad hoc network with infrastructure, in: Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2007, pp. 239– 246. [18] W.-Y. Shin, S.-W. Jeon, N. Devroye, M.H. Vu, S.-Y. Chung, Y.H. Lee, V. Tarokh, Improved capacity scaling in wireless networks with infrastructure, IEEE Trans. Inf. Theory 57 (2008) 5088–5102. [19] C. Guthy, W. Utschick, M.L. Honig, Large system analysis of sum capacity in the Gaussian MIMO broadcast channel, IEEE J. Sel. Areas Commun. 31 (2013) 149–159. [20] c. Çapar, D. Goeckel, D. Towsley, R. Gibbens, A. Swami, Cut results for the capacity of hybrid networks, in: Proceedings of Annual Conference of International Technology Alliance (ACITA), 2011, pp. 1–2.

552

C. Jeong, W.-Y. Shin / Ad Hoc Networks 37 (2016) 543–552

[21] c. Çapar, D. Goeckel, D. Towsley, R. Gibbens, A. Swami, Capacity of hybrid networks, in: Proceedings of Annual Conference of International Technology Alliance (ACITA), 2012, pp. 1–8. [22] C. Jeong, W.-Y. Shin, Large-scale ad hoc networks with rate-limited infrastructure: Information-theoretic operating regimes, in: Proceedings of IEEE International Symposium on Information Theory (ISIT), 2013, pp. 424–428. [23] S. Sesia, I. Toufik, M. Baker, LTE – The UMTS Long Term Evolution: From Theory to Practice, John Wiley & Sons, Chippenham (UK), 2011. [24] P. Marsch, G. Fettweis, A framework for optimizing the uplink performance of distributed antenna systems under a constrained backhaul, in: Proceedings of IEEE International Conference on Communications (ICC), 2007, pp. 975–979. [25] B. Nazer, A. Sanderovich, M. Gastpar, S.S. (Shitz), Structured superposition for backhaul constrained cellular uplink, in: Proceedings of IEEE International Symposium on Information Theory (ISIT), 2009, pp. 1530–1534. [26] A. Sanderovich, O. Somekh, S.S. (Shitz), Uplink macro diversity with limited backhaul capacity, in: Proceedings of International Symposium on Information Theory (ISIT), 2007, pp. 11–15. [27] A. Sanderovich, O. Somekh, H.V. Poor, S.S. (Shitz), Uplink macro diversity of limited backhaul cellular network, IEEE Trans. Inf. Theory 55 (2009) 3457–3478. [28] S.S. (Shitz), O. Simeone, O. Somekh, A. Sanderovich, Informationtheoretic implications of constrained cooperation in simple cellular models, in: Proceedings of IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2008, pp. 1–5. [29] C. Jeong, W.-Y. Shin, Ad hoc networking with rate-limited infrastructure: Generalized capacity scaling, in: Proceedings of IEEE International Symposium on Information Theory (ISIT), 2014, pp. 61–65. [30] S.-H. Park, O. Simeone, O. Sahin, S.S. (Shitz), Joint precoding and multivariate Backhaul compression for the downlink of cloud radio access networks, IEEE Trans. Signal Process. 61 (2013) 5646–5658. [31] A. Özgür, R. Johari, D.N.C. Tse, O. Lévêque, Information-theoretic operating regimes of large wireless networks, IEEE Trans. Inf. Theory 56 (2010) 427–437. [32] F. Gomez-Cuba, S. Rangan, E. Erkip, Scaling laws for infrastructure single and multihop wireless networks in wideband regimes, in: Proceedings of IEEE International Symposium on Information Theory (ISIT), 2014, pp. 76–80. [33] P. Viswanath, D.N.C. Tse, Sum capacity of the vector Gaussian broadcast channel and uplink-downlk duality, IEEE Trans. Inf. Theory 49 (2003) 1912–1921.

Cheol Jeong received the B.S. degree in electrical and electronics engineering from Yonsei University, Seoul, Korea, in 2003, and the Ph.D. degree in electrical engineering from KAIST, Daejeon, Korea, in 2010. From August 2010 to July 2011, he was with the Department of Electrical and Computer Engineering, Queen’s University, Kingston, Canada, as a Postdoctoral Fellow. In September 2011, he joined the Samsung Electronics, where he is currently a senior engineer. His research interests include MIMO relay communications, physical layer security, ad hoc networks, and millimeter-wave communications. Won-Yong Shin received the B.S. degree in electrical engineering from Yonsei University, Seoul, Korea, in 2002. He received the M.S. and the Ph.D. degrees in electrical engineering and computer science from Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea, in 2004 and 2008, respectively. From February 2008 to April 2008, he was a Visiting Scholar in the School of Engineering and Applied Sciences, Harvard University, Cambridge, MA. From September 2008 to April 2009, he was with the Brain Korea Institute and CHiPS at KAIST as a Postdoctoral Fellow. From August 2008 to April 2009, he was with the Lumicomm, Inc., Daejeon, Korea, as a Visiting Researcher. In May 2009, he joined Harvard University as a Postdoctoral Fellow and was promoted to a Research Associate in October 2011. Since March 2012, he has been with the Division of Mobile Systems Engineering, College of International Studies and the Department of Computer Science and Engineering, Dankook University, Yongin, Korea, where he is currently an Assistant Professor. His research interests are in the areas of information theory, communications, signal processing, mobile computing, big data analytics, and online social networks analysis. Dr. Shin has served as an Associate Editor for the IEICE Transactions on Fundamentals of Electronics, Communications, Computer Sciences, for the IEIE Transactions on Smart Processing and Computing, and for the Journal of Korea Information and Communications Society. He also served as an Organizing Committee for the 2015 IEEE Information Theory Workshop.

HierHybNET: Capacity scaling of ad hoc networks with ...

networks consisting of both wireless ad hoc nodes and in- frastructure .... 3 It was shown that the HC scheme is order-optimal in a dense network even with ...... cessing, mobile computing, big data analytics, and online social networks analysis.

813KB Sizes 2 Downloads 273 Views

Recommend Documents

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
... tends to infinity. This is the best perfor- ...... The next theorem reveals a good property of uniformly ..... 005); National High tech grant of China (2009AA01Z248,.

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
less ad hoc networks with infrastructure support. Mobility and ..... different complete proof of the upper bound is also available in [3]. But our approach is simpler.

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Keywords-Ad hoc wireless networks; hybrid wireless net- work; mobility; capacity .... A smaller m represents a more severe degree of clustering and vice versa.

Regularity, Interference, and Capacity of Large Ad Hoc Networks
alytical tools from stochastic geometry are used, including the probability generating functional of Poisson cluster processes, the Palm characterization of Poisson cluster ..... Let Cl(ϵ, T) and Cu(ϵ, T) denote lower and upper bounds to the transm

Regularity, Interference, and Capacity of Large Ad Hoc Networks
Moreover, even if the complete set of nodes constitutes a PPP, the subset of active nodes (e.g., transmitters in a given timeslot or sentries in a sensor network), ...

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Jun 24, 2010 - Uniformly Dense Networks. Non-uniformly Dense Networks. Capacity Scaling in Mobile Wireless Ad Hoc. Network with Infrastructure Support.

HierHybNET: Cut-set upper bound of ad hoc networks ...
Jul 23, 2015 - س Springer Science+Business Media New York 2015. Abstract This paper ... number of wireless nodes, n, a generalized upper bound on the capacity scaling is .... Hًn1ہ ق for an arbitrarily small [ 0, in dense networks of unit area. .

Improved Capacity Scaling in Wireless Networks With ...
the throughput of wireless networks up to a linear scaling in a variety of network scenarios by using novel techniques such as networks with node mobility [7], ...

Topology Organize In Mobile Ad Hoc Networks with ...
Instant conferences between notebook PC users, military applications, emergency ... links and how the links work in wireless networks to form a good network ...

Interference in Ad Hoc Networks with General Motion ...
transmitter which the receiver want to receive data from. ¯Fu. I (y)=1 − (1 − ϕ(y))G. (. Fh .... cluster process and the hard core (minimum distance) process. We always consider .... by a PPP of intensity n in a unit disk. So the results of a P

Routing in Ad-Hoc Networks
generate a significant amount of network control traffic when the topology of the network changes frequently. Lastly, packets can .... time, which happens very often in radio networks due to collisions or other transmission problems. In addition, OLS

wireless ad hoc networks pdf
Loading… Page 1. Whoops! There was a problem loading more pages. wireless ad hoc networks pdf. wireless ad hoc networks pdf. Open. Extract. Open with.

Large-Scale Ad Hoc Networks with Rate-Limited ...
†DMC R&D Center, Samsung Electronics, Suwon 443-742, Republic of Korea. ‡Mobile ... in which the required rate CBS scales much slower than 1. We ..... 3. Operating regimes on the achievable throughput scaling with respect to β and γ.

performance of network coding in ad hoc networks
Computer Science Department, University of California, Los Angeles ... Laboratory for Information and Decision Systems, Massachusetts Institute of Technology.

Modelling cooperation in mobile ad hoc networks: a ...
one. However, the general approach followed was proposing a mechanism or a protocol ... network with probability one. ... nodes from all the network services.

Mitigating starvation in Wireless Ad hoc Networks: Multi ...
sage indicating the transmission power Pd. Upon receiving the ATIM-ACK, node S ..... mation Computing Development Program through the Na- tional Research ...

Overhearing-aided Data Caching in Wireless Ad Hoc Networks
Abstract—The wireless ad hoc network is a promising networking technology to provide users with various network services anywhere anytime. To cope with resource constraints of wireless ad hoc networks, data caching is widely used to efficiently red

Ad Hoc Networks Using Opportunistic Routing
Jun 29, 2007 - [10] show achievable scaling laws do not change funda- mentally if ... This workwas supported in part by the University Information Technology.

Connected k-Hop Clustering in Ad Hoc Networks
information transmission flooding could be confined within each cluster. In an ad ...... dominating set (CDS) to carry out data propagation. Find- ing a minimum ...

Secure Anonymous routing in Ad Hoc networks
vulnerable to packet type analysis attacks thus do not provide complete ... requiring operations, this goal effectively means that the protocol should make ...