Resilient large-scale cognitive radio ad hoc networking using path-time codes

Yi-Chi Chen, I-Wei Lai, Kwang-Cheng Chen
{"title":"Resilient large-scale cognitive radio ad hoc networking using path-time codes","authors":"Yi-Chi Chen, I-Wei Lai, Kwang-Cheng Chen","doi":"10.1109/ICC.2017.7996413","DOIUrl":null,"url":null,"abstract":"Cognitive radio ad hoc networks (CRAHNs) emerge as a spectrum efficient networking technology to enable autonomous machine-to-machine communication among massive number of IoT devices. However, spectrum sharing results in opportunistic links and CRAHN becomes a kind of opportunistic networks. To reduce latency in CRAHN and to achieve overall spectrum efficiency by avoiding tremendous feedback signaling, CRAHNs of open-loop physical layer transmission open a new avenue under massive operations. The new technology challenge associated with such new CRAHNs lies in error control with only local networking information without relying on feedback control over each opportunistic link. Path-time codes virtually realizing multi-input-multi-output over network layer have been innovated to resolve such a dilemma. However, effective multipath routing considering interference remains unclear. In this paper, be taking network topological factors and interference into account, we analytically derive SINR approximations to design power control and multi-path greedy routing. By stochastic geometry analysis, we also show that the resilient operation for large-scale CRAHNs can be facilitated with the aid of path-time codes.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Communications (ICC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.2017.7996413","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cognitive radio ad hoc networks (CRAHNs) emerge as a spectrum efficient networking technology to enable autonomous machine-to-machine communication among massive number of IoT devices. However, spectrum sharing results in opportunistic links and CRAHN becomes a kind of opportunistic networks. To reduce latency in CRAHN and to achieve overall spectrum efficiency by avoiding tremendous feedback signaling, CRAHNs of open-loop physical layer transmission open a new avenue under massive operations. The new technology challenge associated with such new CRAHNs lies in error control with only local networking information without relying on feedback control over each opportunistic link. Path-time codes virtually realizing multi-input-multi-output over network layer have been innovated to resolve such a dilemma. However, effective multipath routing considering interference remains unclear. In this paper, be taking network topological factors and interference into account, we analytically derive SINR approximations to design power control and multi-path greedy routing. By stochastic geometry analysis, we also show that the resilient operation for large-scale CRAHNs can be facilitated with the aid of path-time codes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用路径时间编码的弹性大规模认知无线电自组织网络
认知无线电自组织网络(CRAHNs)作为一种频谱高效的网络技术出现,可以实现大量物联网设备之间的自主机器对机器通信。然而,频谱共享导致机会链路,CRAHN成为一种机会网络。为了降低CRAHN中的时延,避免大量的反馈信令,达到整体的频谱效率,开环物理层传输的CRAHN在大规模运行下开辟了一条新的途径。与这种新型crahn相关的新技术挑战在于仅使用本地网络信息进行错误控制,而不依赖于对每个机会链路的反馈控制。在网络层上虚拟实现多输入多输出的路径时码解决了这一难题。然而,考虑干扰的有效多径路由仍然不清楚。本文在考虑网络拓扑因素和干扰的情况下,解析导出信噪比近似,设计功率控制和多径贪婪路由。通过随机几何分析,我们还证明了路径时间编码可以促进大规模crahn的弹性操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Dynamic control of NFV forwarding graphs with end-to-end deadline constraints New sensing technique for detecting application layer DDoS attacks targeting back-end database resources Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems On the two time scale characteristics of wireless high speed railway networks Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1