首页 > 最新文献

2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks最新文献

英文 中文
On the k-coverage of line segments by a non homogeneous Poisson-Boolean model 非齐次泊松-布尔模型下线段的k覆盖
S. T. Aditya, P. Manohar, D. Manjunath
We consider k-coverage of a line by a twodimensional, non homogeneous Poisson-Boolean model. This has applications in sensor networks. We extend the analysis of [1] to the case for k ≫ 1. The extension requires us to define a vector Markov process that tracks the k segments that have the longest residual coverage at a point. This process is used to determine the probability of a segment of the line being completely covered by k or more sensors. We illustrate the extension by considering the case of k = 2.
我们用二维非齐次泊松布尔模型考虑直线的k覆盖。这在传感器网络中有应用。我们将[1]的分析推广到k≠1的情况。扩展要求我们定义一个向量马尔可夫过程,它跟踪在某一点上具有最长残差覆盖的k个线段。这个过程用于确定一段线被k个或更多的传感器完全覆盖的概率。我们通过考虑k = 2的情况来说明推广。
{"title":"On the k-coverage of line segments by a non homogeneous Poisson-Boolean model","authors":"S. T. Aditya, P. Manohar, D. Manjunath","doi":"10.1109/WIOPT.2009.5291571","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291571","url":null,"abstract":"We consider k-coverage of a line by a twodimensional, non homogeneous Poisson-Boolean model. This has applications in sensor networks. We extend the analysis of [1] to the case for k ≫ 1. The extension requires us to define a vector Markov process that tracks the k segments that have the longest residual coverage at a point. This process is used to determine the probability of a segment of the line being completely covered by k or more sensors. We illustrate the extension by considering the case of k = 2.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"545 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retransmission aware congestion control and distributed power allocation in MANETs 城域网中重传感知拥塞控制与分布式功率分配
A. Giovanidis, S. Stańczak
In the current work the effects of hop-by-hop packet loss and retransmissions via ARQ protocols are investigated within a Mobile Ad-hoc NET-work (MANET). Errors occur due to outages and a success probability function is related to each link, which can be controlled by power and rate allocation. We first derive the expression for the network's capacity region. A Network Utility Maximization problem (NUM) with stability constraints is further formulated which decomposes into (a) the input rate control problem and (b) the scheduling problem. The NUM problem can be solved in a fully decentralized manner if (b) is solved distributedly. Use of supermodular game theory suggests a price based algorithm that requires minimum information exchange between interfering nodes and converges to a power allocation which satisfies the necessary optimality conditions of (b). Simulations illustrate that the suggested algorithm brings near optimal results.
在当前的工作中,研究了移动自组网(MANET)中逐跳数据包丢失和通过ARQ协议重传的影响。由于停电而产生错误,每个链路都有一个成功概率函数,可以通过功率和速率分配来控制。首先推导出网络容量区域的表达式。进一步提出了具有稳定性约束的网络效用最大化问题(NUM),该问题分解为(A)输入速率控制问题和(b)调度问题。如果(b)以分布式方式解决,NUM问题可以以完全去中心化的方式解决。利用超模博弈论提出了一种基于价格的算法,该算法需要最小的干扰节点之间的信息交换,并收敛到满足(b)中必要的最优性条件的功率分配。仿真表明,该算法带来了接近最优的结果。
{"title":"Retransmission aware congestion control and distributed power allocation in MANETs","authors":"A. Giovanidis, S. Stańczak","doi":"10.1109/WIOPT.2009.5291588","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291588","url":null,"abstract":"In the current work the effects of hop-by-hop packet loss and retransmissions via ARQ protocols are investigated within a Mobile Ad-hoc NET-work (MANET). Errors occur due to outages and a success probability function is related to each link, which can be controlled by power and rate allocation. We first derive the expression for the network's capacity region. A Network Utility Maximization problem (NUM) with stability constraints is further formulated which decomposes into (a) the input rate control problem and (b) the scheduling problem. The NUM problem can be solved in a fully decentralized manner if (b) is solved distributedly. Use of supermodular game theory suggests a price based algorithm that requires minimum information exchange between interfering nodes and converges to a power allocation which satisfies the necessary optimality conditions of (b). Simulations illustrate that the suggested algorithm brings near optimal results.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133083914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal link scheduling and channel assignment for convergecast in linear WirelessHART networks 线性WirelessHART网络中最优链路调度和信道分配
Haibo Zhang, Pablo Soldati, M. Johansson
Convergecast, in which data from a set of sources is routed toward one data sink, is a critical functionality for wireless networks deployed for industrial monitoring and control. We address the joint link scheduling and channel assignment problem for convergecast in networks operating according to the recent WirelessHART standard. For a linear network with N single-buffer devices, we demonstrate that the minimum time to complete convergecast is 2N-1 time-slots, and that the minimum number of channels required for this operation is ⌈N/2⌉. When the devices are allowed to buffer multiple packets, we prove that the optimal convergecast time remains the same while the number of required channels can be reduced to . For both cases, we present jointly time- and channel-optimal scheduling policies with complexity O(N2). Numerical results demonstrate that our schemes are also efficient in terms of memory utilization.
Convergecast是用于工业监控的无线网络的一项关键功能,它将来自一组源的数据路由到一个数据接收器。本文研究了基于最新无线shart标准的网络中汇聚广播的联合链路调度和信道分配问题。对于具有N个单缓冲设备的线性网络,我们证明了完成收敛的最小时间为2N-1个时隙,并且该操作所需的最小通道数为≤N/2²。当允许设备缓冲多个数据包时,我们证明了最优收敛时间保持不变,而所需的通道数可以减少到。针对这两种情况,我们提出了复杂度为O(N2)的时间和通道最优调度策略。数值结果表明,我们的方案在内存利用率方面也很有效。
{"title":"Optimal link scheduling and channel assignment for convergecast in linear WirelessHART networks","authors":"Haibo Zhang, Pablo Soldati, M. Johansson","doi":"10.1109/WIOPT.2009.5291641","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291641","url":null,"abstract":"Convergecast, in which data from a set of sources is routed toward one data sink, is a critical functionality for wireless networks deployed for industrial monitoring and control. We address the joint link scheduling and channel assignment problem for convergecast in networks operating according to the recent WirelessHART standard. For a linear network with N single-buffer devices, we demonstrate that the minimum time to complete convergecast is 2N-1 time-slots, and that the minimum number of channels required for this operation is ⌈N/2⌉. When the devices are allowed to buffer multiple packets, we prove that the optimal convergecast time remains the same while the number of required channels can be reduced to . For both cases, we present jointly time- and channel-optimal scheduling policies with complexity O(N2). Numerical results demonstrate that our schemes are also efficient in terms of memory utilization.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132334272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Gaming the jammer: Is frequency hopping effective? 利用干扰器:跳频有效吗?
K. Pelechrinis, Christos Koufogiannakis, S. Krishnamurthy
Frequency hopping has been the most popularly considered approach for alleviating the effects of jamming attacks. In this paper, we provide a novel, measurement-driven, game theoretic framework that captures the interactions between a communication link and an adversarial jammer, possibly with multiple jamming devices, in a wireless network employing frequency hopping (FH). The framework can be used to quantify the efficacy of FH as a jamming countermeasure. Our model accounts for two important factors that affect the aforementioned interactions: (a) the number of orthogonal channels available for use and (b) the frequency separation between these orthogonal bands. If the latter is small, then the energy spill over between two adjacent channels (considered orthogonal) is high; as a result a jammer on an orthogonal band that is adjacent to that used by a legitimate communication, can be extremely effective. We account for both these factors and using our framework we provide bounds on the performance of proactive frequency hopping in alleviating the impact of a jammer. The main contributions of our work are: (a) Construction of a measurement driven game theoretic framework which models the interactions between a jammer and a communication link that employ FH. (b) Extensive experimentation on our indoor testbed in order to quantify the impact of a jammer in a 802.11a/g network. (c) Application of our framework to quantify the efficacy of proactive FH across a variety of 802.11 network configurations. (d) Formal derivation of the optimal strategies for both the link and the jammer in 802.11 networks. Our results demonstrate that frequency hopping is largely inadequate in coping with jamming attacks in current 802.11 networks. In particular, we show that if current systems were to support hundreds of additional channels, FH would form a robust jamming countermeasure1.
跳频是缓解干扰攻击影响的最普遍的方法。在本文中,我们提供了一个新颖的,测量驱动的博弈论框架,该框架捕获了通信链路和对抗性干扰机之间的相互作用,可能具有多个干扰设备,在采用跳频(FH)的无线网络中。该框架可用于量化跳频作为干扰对抗的有效性。我们的模型考虑了影响上述相互作用的两个重要因素:(a)可供使用的正交信道的数量和(b)这些正交频带之间的频率间隔。如果后者很小,则两个相邻通道(认为是正交的)之间的能量溢出很高;因此,在与合法通信使用的正交频带相邻的频带上的干扰器可能非常有效。我们考虑了这两个因素,并使用我们的框架,我们提供了主动跳频性能的界限,以减轻干扰器的影响。我们工作的主要贡献是:(a)构建了一个测量驱动的博弈论框架,该框架模拟了使用跳频的干扰机和通信链路之间的相互作用。(b)在我们的室内测试台上进行大量实验,以量化干扰器在802.11a/g网络中的影响。(c)应用我们的架构,量化在不同802.11网络配置下主动跳频的效能。(d)正式推导802.11网络中链路和干扰器的最佳策略。我们的研究结果表明,在当前的802.11网络中,跳频在应对干扰攻击方面很大程度上是不够的。特别是,我们表明,如果当前的系统支持数百个额外的信道,跳频将形成一个强大的干扰对策1。
{"title":"Gaming the jammer: Is frequency hopping effective?","authors":"K. Pelechrinis, Christos Koufogiannakis, S. Krishnamurthy","doi":"10.1109/WIOPT.2009.5291621","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291621","url":null,"abstract":"Frequency hopping has been the most popularly considered approach for alleviating the effects of jamming attacks. In this paper, we provide a novel, measurement-driven, game theoretic framework that captures the interactions between a communication link and an adversarial jammer, possibly with multiple jamming devices, in a wireless network employing frequency hopping (FH). The framework can be used to quantify the efficacy of FH as a jamming countermeasure. Our model accounts for two important factors that affect the aforementioned interactions: (a) the number of orthogonal channels available for use and (b) the frequency separation between these orthogonal bands. If the latter is small, then the energy spill over between two adjacent channels (considered orthogonal) is high; as a result a jammer on an orthogonal band that is adjacent to that used by a legitimate communication, can be extremely effective. We account for both these factors and using our framework we provide bounds on the performance of proactive frequency hopping in alleviating the impact of a jammer. The main contributions of our work are: (a) Construction of a measurement driven game theoretic framework which models the interactions between a jammer and a communication link that employ FH. (b) Extensive experimentation on our indoor testbed in order to quantify the impact of a jammer in a 802.11a/g network. (c) Application of our framework to quantify the efficacy of proactive FH across a variety of 802.11 network configurations. (d) Formal derivation of the optimal strategies for both the link and the jammer in 802.11 networks. Our results demonstrate that frequency hopping is largely inadequate in coping with jamming attacks in current 802.11 networks. In particular, we show that if current systems were to support hundreds of additional channels, FH would form a robust jamming countermeasure1.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Finite random geometric graphs by circular and square coverage 有限随机几何图形由圆形和正方形覆盖
Chi-Kin Chau
Random geometric graphs are widely-used for modelling wireless ad hoc networks, where nodes are randomly deployed with each covering a finite region. The fundamental properties of random geometric graphs are often studied in the literature, such as the probability of connectivity and random coverage area. While there are numerous asymptotic results that concern the related scaling laws in very large random geometric graphs, more accurate estimation for the finite cases with moderate-sized networks remains challenging. In this paper, we present a remarkably good approximation relationship for the probability of connectivity and random coverage area between the random geometric graphs induced by circular and square coverage models, under suitable normalisation. We also provide analytical results towards justifying the good approximation relationship. This relationship is then exploited, combining with the results from reliability studies, to obtain more accurate estimation for the probability of connectivity in finite random geometric graphs.
随机几何图广泛用于无线自组织网络建模,其中节点随机部署,每个节点覆盖有限区域。文献中经常研究随机几何图的基本性质,如连通性概率和随机覆盖面积。虽然在非常大的随机几何图中有许多关于相关标度律的渐近结果,但对中等规模网络的有限情况进行更准确的估计仍然具有挑战性。在适当的归一化条件下,我们给出了圆形和方形覆盖模型所生成的随机几何图的连通性概率和随机覆盖面积的一个非常好的近似关系。我们还提供了分析结果来证明良好的近似关系。然后利用这种关系,结合可靠性研究的结果,获得有限随机几何图中连通性概率的更准确估计。
{"title":"Finite random geometric graphs by circular and square coverage","authors":"Chi-Kin Chau","doi":"10.1109/WIOPT.2009.5291570","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291570","url":null,"abstract":"Random geometric graphs are widely-used for modelling wireless ad hoc networks, where nodes are randomly deployed with each covering a finite region. The fundamental properties of random geometric graphs are often studied in the literature, such as the probability of connectivity and random coverage area. While there are numerous asymptotic results that concern the related scaling laws in very large random geometric graphs, more accurate estimation for the finite cases with moderate-sized networks remains challenging. In this paper, we present a remarkably good approximation relationship for the probability of connectivity and random coverage area between the random geometric graphs induced by circular and square coverage models, under suitable normalisation. We also provide analytical results towards justifying the good approximation relationship. This relationship is then exploited, combining with the results from reliability studies, to obtain more accurate estimation for the probability of connectivity in finite random geometric graphs.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploiting buffers in cognitive multi-relay systems for delay-sensitive applications 在延迟敏感应用的认知多中继系统中利用缓冲区
Yan Chen, V. Lau, Shunqing Zhang, Peiliang Qiu
Cognitive and cooperative technologies are two core components in the design of next generation wireless networks. One key issue associated with cognitive transmission is the inefficient spectrum sharing of the secondary system, especially for secondary communications separated by long distance. To boost the spectrum sharing efficiency, cognitive multi-relay system appears to be an attractive solution for the cognitive transmission systems. In this paper, we consider a cognitive multi-relay (CMR) system and propose a novel CMR buffered decode-and-forward protocol that exploit the buffers in the source and each relay node. Moreover, we derive the closed-form average end-to-end delay and the stability region by exploiting the birth-death nature of the queue dynamics and the methods of state aggregation and queue dominance. Comparing with the baseline protocols through analytical and numerical results, the proposed CMR-BDF scheme can dynamically adjust the cognitive transmission to exploit the spatial PU burstiness while simultaneously benefits from the advantage of double-sided selection diversity in both the source-relay and relay-destination interfaces.
认知技术和协作技术是下一代无线网络设计的两个核心组成部分。与认知传输相关的一个关键问题是二级系统的频谱共享效率低下,特别是对于远距离分离的二级通信。为了提高频谱共享效率,认知多中继系统是认知传输系统中一个有吸引力的解决方案。在本文中,我们考虑了一个认知多中继(CMR)系统,并提出了一种新的CMR缓冲解码和转发协议,该协议利用了源和每个中继节点中的缓冲区。利用队列动力学的生-死性质,利用状态聚合和队列优势的方法,导出了闭型平均端到端延迟和稳定区域。分析和数值结果表明,与基线协议相比,CMR-BDF方案可以动态调整认知传输以利用空间PU突发性,同时利用源中继和中继目的接口的双面选择分集优势。
{"title":"Exploiting buffers in cognitive multi-relay systems for delay-sensitive applications","authors":"Yan Chen, V. Lau, Shunqing Zhang, Peiliang Qiu","doi":"10.1109/WIOPT.2009.5291602","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291602","url":null,"abstract":"Cognitive and cooperative technologies are two core components in the design of next generation wireless networks. One key issue associated with cognitive transmission is the inefficient spectrum sharing of the secondary system, especially for secondary communications separated by long distance. To boost the spectrum sharing efficiency, cognitive multi-relay system appears to be an attractive solution for the cognitive transmission systems. In this paper, we consider a cognitive multi-relay (CMR) system and propose a novel CMR buffered decode-and-forward protocol that exploit the buffers in the source and each relay node. Moreover, we derive the closed-form average end-to-end delay and the stability region by exploiting the birth-death nature of the queue dynamics and the methods of state aggregation and queue dominance. Comparing with the baseline protocols through analytical and numerical results, the proposed CMR-BDF scheme can dynamically adjust the cognitive transmission to exploit the spatial PU burstiness while simultaneously benefits from the advantage of double-sided selection diversity in both the source-relay and relay-destination interfaces.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmission schedule optimization for half-duplex multiple-relay networks 半双工多中继网络的传输调度优化
Wen Wang, L. Ong, M. Motani
Half duplex devices are widely used in today's wireless networks. These devices can only send or receive, but not do both at the same time. In this paper, we use cooperative decode-forward relay strategies to increase the throughput of half-duplex wireless networks. Due to the half duplex constraint, relays need to carefully choose their transmission states in order to maximize the throughput. We show that the transmission schedule optimization can be formulated as a linear programming problem. Although the number of possible states grows exponentially as the number of relays increases, only a small subset of these states needs to be used in the optimal transmission schedule. This observation allows us to use heuristic algorithms to solve for near-optimal schedule in large networks. Our numerical results show that the decode-forward strategy can provide nearly 3 times more throughput than the traditional multi-hop relaying strategy in half duplex wireless networks.
半双工设备广泛应用于当今的无线网络中。这些设备只能发送或接收,但不能同时做这两件事。在本文中,我们使用协作的前向译码中继策略来提高半双工无线网络的吞吐量。由于半双工的限制,中继需要仔细选择他们的传输状态,以最大限度地提高吞吐量。我们证明了传输调度优化可以被表述为一个线性规划问题。尽管随着中继数量的增加,可能的状态数量呈指数增长,但这些状态中只有一小部分需要用于最优传输调度。这一观察结果允许我们使用启发式算法来求解大型网络中的近最优调度。数值结果表明,在半双工无线网络中,译码转发策略提供的吞吐量是传统多跳中继策略的近3倍。
{"title":"Transmission schedule optimization for half-duplex multiple-relay networks","authors":"Wen Wang, L. Ong, M. Motani","doi":"10.1109/WIOPT.2009.5291631","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291631","url":null,"abstract":"Half duplex devices are widely used in today's wireless networks. These devices can only send or receive, but not do both at the same time. In this paper, we use cooperative decode-forward relay strategies to increase the throughput of half-duplex wireless networks. Due to the half duplex constraint, relays need to carefully choose their transmission states in order to maximize the throughput. We show that the transmission schedule optimization can be formulated as a linear programming problem. Although the number of possible states grows exponentially as the number of relays increases, only a small subset of these states needs to be used in the optimal transmission schedule. This observation allows us to use heuristic algorithms to solve for near-optimal schedule in large networks. Our numerical results show that the decode-forward strategy can provide nearly 3 times more throughput than the traditional multi-hop relaying strategy in half duplex wireless networks.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114263092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bargaining over fading interference channels 在衰落干扰信道上讨价还价
J. Brehmer, W. Utschick
We consider the problem of bargaining over block fading interference channels, where interaction between players takes place over multiple channel realizations. Based on the assumption that the transmitters have conflicting objectives, we use axiomatic bargaining theory to derive optimal rate allocations in each block. In the setup under consideration, the Nash bargaining solution (NBS) is non-causal, i.e., cannot be implemented in a real-world system. We argue that the invariance axiom is superfluous when bargaining over a rate region. Without the invariance axiom, an equivalent solution follows from the maximization of a sum of utilities under minimum utility constraints. This alternative solution is also non-causal. We propose causal approximations to the optimal solutions. The sum utility solution allows for a more systematic approximation than the NBS. Thus, dropping the invariance axiom makes it possible to choose a solution which can be better approximated. We provide numerical results to illustrate the performance of the proposed solutions.
我们考虑在块衰落干扰信道上讨价还价的问题,其中参与者之间的交互发生在多个信道实现上。基于发射机目标冲突的假设,我们使用公理议价理论推导出每个区块的最优费率分配。在考虑的设置中,纳什议价解决方案(NBS)是非因果的,即不能在现实世界系统中实现。我们论证了在速率域上讨价还价时不变性公理是多余的。在没有不变性公理的情况下,从最小效用约束下效用和的最大化得到一个等价解。这种替代解决方案也是非因果的。我们提出了最优解的因果近似。与国家统计局相比,总和效用解决方案允许更系统的近似。因此,放弃不变性公理使得选择一个可以更好地近似的解成为可能。我们提供了数值结果来说明所提出的解决方案的性能。
{"title":"Bargaining over fading interference channels","authors":"J. Brehmer, W. Utschick","doi":"10.1109/WIOPT.2009.5291614","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291614","url":null,"abstract":"We consider the problem of bargaining over block fading interference channels, where interaction between players takes place over multiple channel realizations. Based on the assumption that the transmitters have conflicting objectives, we use axiomatic bargaining theory to derive optimal rate allocations in each block. In the setup under consideration, the Nash bargaining solution (NBS) is non-causal, i.e., cannot be implemented in a real-world system. We argue that the invariance axiom is superfluous when bargaining over a rate region. Without the invariance axiom, an equivalent solution follows from the maximization of a sum of utilities under minimum utility constraints. This alternative solution is also non-causal. We propose causal approximations to the optimal solutions. The sum utility solution allows for a more systematic approximation than the NBS. Thus, dropping the invariance axiom makes it possible to choose a solution which can be better approximated. We provide numerical results to illustrate the performance of the proposed solutions.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-sensor event detection under temporal correlations with renewable energy sources 可再生能源时间相关性下的多传感器事件检测
Neeraj Jaggi, K. Kar
Sensor networks have major applications in environmental monitoring, relief operations, surveillance, health-care and defense. Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. Multiple sensor nodes deployed in the region of interest would collaborate to achieve a global objective, such as detection of application specific events. This paper focuses on the design of efficient algorithms for multi-sensor activation in order to optimize the overall event detection probability. The recharge-discharge dynamics of the individual rechargeable sensor nodes, along with temporally correlated nature of event occurrences makes the optimal multi-sensor event detection question very challenging. We formulate the dynamic multi-sensor event detection question in a stochastic optimization framework, and design efficient sensor activation algorithms. Particularly, we analyze certain classes of threshold activation policies and show that they achieve near-optimal performance when the threshold is chosen carefully. Specifically, we show that a time-invariant threshold policy, which attempts to maintain a fixed number (appropriately chosen) of sensors active at all times, is optimal in absence of temporal correlations. Moreover, the same energy-balancing time-invariant threshold policy approaches optimality in presence of temporal correlations as well, albeit under certain limiting assumptions. Through simulation studies, we compare the performance of this time-invariant policy with energy-balancing correlation-dependent policies, and observe that although the latter perform better, the performance difference is rather small.
传感器网络在环境监测、救济行动、监视、保健和国防方面有重要应用。未来的传感器网络将包括具有可再生能源(如太阳能)能量收集能力的传感设备。部署在感兴趣区域的多个传感器节点将协作实现全局目标,例如检测特定应用程序事件。本文重点研究了多传感器激活的有效算法设计,以优化整体事件检测概率。单个可充电传感器节点的充放电动力学,以及事件发生的时间相关性,使得最优的多传感器事件检测问题非常具有挑战性。我们在随机优化框架中提出了动态多传感器事件检测问题,并设计了高效的传感器激活算法。特别是,我们分析了某些类型的阈值激活策略,并表明当仔细选择阈值时,它们可以获得接近最佳的性能。具体来说,我们表明,在没有时间相关性的情况下,尝试保持固定数量(适当选择)的活动传感器的时不变阈值策略是最优的。此外,尽管在某些限制假设下,相同的能量平衡定常阈值策略在存在时间相关性的情况下也接近最优性。通过仿真研究,我们比较了这种时不变策略与能量平衡相关依赖策略的性能,发现后者虽然性能更好,但性能差异很小。
{"title":"Multi-sensor event detection under temporal correlations with renewable energy sources","authors":"Neeraj Jaggi, K. Kar","doi":"10.1109/WIOPT.2009.5291634","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291634","url":null,"abstract":"Sensor networks have major applications in environmental monitoring, relief operations, surveillance, health-care and defense. Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. Multiple sensor nodes deployed in the region of interest would collaborate to achieve a global objective, such as detection of application specific events. This paper focuses on the design of efficient algorithms for multi-sensor activation in order to optimize the overall event detection probability. The recharge-discharge dynamics of the individual rechargeable sensor nodes, along with temporally correlated nature of event occurrences makes the optimal multi-sensor event detection question very challenging. We formulate the dynamic multi-sensor event detection question in a stochastic optimization framework, and design efficient sensor activation algorithms. Particularly, we analyze certain classes of threshold activation policies and show that they achieve near-optimal performance when the threshold is chosen carefully. Specifically, we show that a time-invariant threshold policy, which attempts to maintain a fixed number (appropriately chosen) of sensors active at all times, is optimal in absence of temporal correlations. Moreover, the same energy-balancing time-invariant threshold policy approaches optimality in presence of temporal correlations as well, albeit under certain limiting assumptions. Through simulation studies, we compare the performance of this time-invariant policy with energy-balancing correlation-dependent policies, and observe that although the latter perform better, the performance difference is rather small.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A delay-minimizing routing strategy for wireless multi-hop networks 无线多跳网络的时延最小化路由策略
Kostas Stamatiou, F. Rossetto, M. Haenggi, T. Javidi, J. Zeidler, M. Zorzi
We consider a network where each route comprises a backlogged source, a number of relays and a destination at a finite distance. The locations of the sources and the relays are realizations of independent Poisson point processes. Given that the nodes observe a TDMA/ALOHA MAC protocol, our objective is to determine the number of relays and their placement such that the mean end-to-end delay in a typical route of the network is minimized.We first study an idealistic network model where all routes have the same number of hops, the same distance per hop and their own dedicated relays. Combining tools from queueing theory and stochastic geometry, we provide a precise characterization of the mean end-to-end delay. We find that the delay is minimized if the first hop is much longer than the remaining hops and that the optimal number of hops scales sublinearly with the source-destination distance. Simulating the original network scenario reveals that the analytical results are accurate, provided that the density of the relay process is sufficiently large. We conclude that, given the considered MAC protocol, our analysis provides a delay-minimizing routing strategy for random, multihop networks involving a small number of hops.
我们考虑一个网络,其中每条路由包括一个积压的源,一些中继和一个有限距离的目的地。源和继电器的位置是独立泊松点过程的实现。假设节点遵守TDMA/ALOHA MAC协议,我们的目标是确定中继的数量和它们的位置,从而使网络典型路由中的平均端到端延迟最小化。我们首先研究了一个理想网络模型,其中所有路由具有相同的跳数,相同的每跳距离和各自的专用中继。结合排队理论和随机几何的工具,我们提供了端到端平均延迟的精确表征。我们发现,当第一跳比剩余跳长得多时,延迟是最小的,并且最优跳数与源-目的距离呈亚线性关系。通过对原始网络场景的模拟表明,在中继过程密度足够大的情况下,分析结果是准确的。我们的结论是,给定所考虑的MAC协议,我们的分析为涉及少量跳数的随机多跳网络提供了延迟最小化路由策略。
{"title":"A delay-minimizing routing strategy for wireless multi-hop networks","authors":"Kostas Stamatiou, F. Rossetto, M. Haenggi, T. Javidi, J. Zeidler, M. Zorzi","doi":"10.1109/WIOPT.2009.5291567","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291567","url":null,"abstract":"We consider a network where each route comprises a backlogged source, a number of relays and a destination at a finite distance. The locations of the sources and the relays are realizations of independent Poisson point processes. Given that the nodes observe a TDMA/ALOHA MAC protocol, our objective is to determine the number of relays and their placement such that the mean end-to-end delay in a typical route of the network is minimized.We first study an idealistic network model where all routes have the same number of hops, the same distance per hop and their own dedicated relays. Combining tools from queueing theory and stochastic geometry, we provide a precise characterization of the mean end-to-end delay. We find that the delay is minimized if the first hop is much longer than the remaining hops and that the optimal number of hops scales sublinearly with the source-destination distance. Simulating the original network scenario reveals that the analytical results are accurate, provided that the density of the relay process is sufficiently large. We conclude that, given the considered MAC protocol, our analysis provides a delay-minimizing routing strategy for random, multihop networks involving a small number of hops.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"48 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1