首页 > 最新文献

2010 IEEE Global Telecommunications Conference GLOBECOM 2010最新文献

英文 中文
Impact of Mobility on VANETs' Safety Applications 移动性对VANETs安全应用的影响
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684042
K. A. Hafeez, Lian Zhao, Z. Liao, B. Ma
Vehicular Ad hoc Networks (VANETs) differ from the predominant models of Mobile Ad hoc Networks (MANET) due to their high speed, mobility constraints and drivers' behaviour. Most researches on analyzing the performance of VANETs' applications done without taking into account the vehicles' high dynamics assuming stationary distribution of vehicles on the road. They assume that all vehicles within the range of the transmitter will receive the transmitted packets successfully. While vehicles near the outer edge of the transmitter's range are more vulnerable to cross the boundary before they receive the packet completely. They also used Most Forward Within Range (MFR) [1] to forward the message from one hop to the next. In this paper, we develop a new mobility model to derive the number of vehicles on the road and the probability of receiving the broadcasted packets successfully from all vehicles within the range of the transmitter. We also derive the probability of multi hop connectivity taking into account the location of relay vehicles and prove that MFR is not a valid scheme in VANETs.
车辆自组织网络(vanet)不同于移动自组织网络(MANET)的主要模型,因为它们具有高速、移动性约束和驾驶员行为。大多数分析VANETs应用性能的研究都没有考虑车辆的高动态特性,假设车辆在道路上的分布是平稳的。他们假设发射机范围内的所有车辆都能成功接收到传输的数据包。而靠近发射机范围外缘的车辆在完全接收到数据包之前更容易越过边界。他们还使用MFR (Most Forward Within Range)[1]将消息从一跳转发到下一跳。在本文中,我们建立了一个新的移动性模型来推导道路上的车辆数量和从发射机范围内的所有车辆成功接收广播数据包的概率。我们还推导了考虑中继车辆位置的多跳连接概率,并证明了MFR在vanet中不是一种有效的方案。
{"title":"Impact of Mobility on VANETs' Safety Applications","authors":"K. A. Hafeez, Lian Zhao, Z. Liao, B. Ma","doi":"10.1109/GLOCOM.2010.5684042","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684042","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) differ from the predominant models of Mobile Ad hoc Networks (MANET) due to their high speed, mobility constraints and drivers' behaviour. Most researches on analyzing the performance of VANETs' applications done without taking into account the vehicles' high dynamics assuming stationary distribution of vehicles on the road. They assume that all vehicles within the range of the transmitter will receive the transmitted packets successfully. While vehicles near the outer edge of the transmitter's range are more vulnerable to cross the boundary before they receive the packet completely. They also used Most Forward Within Range (MFR) [1] to forward the message from one hop to the next. In this paper, we develop a new mobility model to derive the number of vehicles on the road and the probability of receiving the broadcasted packets successfully from all vehicles within the range of the transmitter. We also derive the probability of multi hop connectivity taking into account the location of relay vehicles and prove that MFR is not a valid scheme in VANETs.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72755112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Performance Comparison of Energy-Efficient Power Control for CDMA Code Acquisition and Detection CDMA码采集与检测中节能功率控制的性能比较
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684239
G. Bacci, M. Luise
This paper investigates the performance of distributed power control techniques in the uplink of a flat-fading CDMA wireless network, based on noncooperative game theory. Two energy-efficient criteria, tailored for data detection and code synchronization, are compared in terms of achieved utility at the Nash equilibrium, showing that the optimal power allocation devised for data detection is not the best solution during synchronization, and analogously the optimal allocation for code acquisition does not provide the best performance during data detection. Closed-form expressions for the optimal powers at the Nash equilibrium are derived, and a unified formulation is proposed to allow a more elaborated power allocation method to be adopted, in which the terminals, using the synchronization-oriented approach, can revert to the data-detection optimal criterion after synchronization is over.
基于非合作博弈理论,研究了分布式功率控制技术在平衰落CDMA无线网络上行链路中的性能。针对数据检测和代码同步定制的两种节能标准在纳什均衡下的实现效用进行了比较,结果表明,为数据检测设计的最优功率分配并不是同步过程中的最佳解决方案,类似地,为代码获取设计的最优分配也不能在数据检测过程中提供最佳性能。推导了纳什均衡下最优功率的封闭表达式,并提出了统一的公式,以便采用更精细的功率分配方法,其中终端采用面向同步的方法,在同步结束后可以恢复到数据检测最优准则。
{"title":"Performance Comparison of Energy-Efficient Power Control for CDMA Code Acquisition and Detection","authors":"G. Bacci, M. Luise","doi":"10.1109/GLOCOM.2010.5684239","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684239","url":null,"abstract":"This paper investigates the performance of distributed power control techniques in the uplink of a flat-fading CDMA wireless network, based on noncooperative game theory. Two energy-efficient criteria, tailored for data detection and code synchronization, are compared in terms of achieved utility at the Nash equilibrium, showing that the optimal power allocation devised for data detection is not the best solution during synchronization, and analogously the optimal allocation for code acquisition does not provide the best performance during data detection. Closed-form expressions for the optimal powers at the Nash equilibrium are derived, and a unified formulation is proposed to allow a more elaborated power allocation method to be adopted, in which the terminals, using the synchronization-oriented approach, can revert to the data-detection optimal criterion after synchronization is over.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73027891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Outage Performance of DF Network Coded (DFNC) Multi-User Cooperative Diversity in Orthogonal Uplink Channels 正交上行信道中DF网络编码(DFNC)多用户合作分集的中断性能
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683704
Bin Guo, K. Vardhe, Yu Liu, Chi Zhou, Yu Cheng
In this paper, we propose a Decode-and-Forward Network Coded (DFNC) multi-user cooperation scheme for orthogonal uplink channels in a wireless network. The network consists of m peers having independent information transmitting to a common destination. Each peer transmits its own data in the first time phase and serves as a relay in the second time phase to transmit the network coded information combining its own and others. Assuming block fading with independent fading coefficients, we evaluate the outage probability performance of the proposed scheme using high-SNR approximation. Particularly, we develop an upper bound on outage probability of DFNC, and compare it with Space-Time-Coded (STC) cooperation protocol and Repetition-based (REP) cooperation protocol. From theoretical analysis and numerical results, we show that the outage performance of proposed scheme outperforms both STC and REP at least in high-SNR region, regardless of total number of cooperating peers and provides diversity order of m + 1 in contrast with diversity order of m provided by STC and REP.
本文针对无线网络中的正交上行信道,提出了一种DFNC(译码转发网络编码)多用户协作方案。网络由m个具有独立信息的对等体组成,这些信息向一个共同的目的地传输。每个对等体在第一个时间阶段传输自己的数据,在第二个时间阶段充当中继,传输自己和其他对等体结合的网络编码信息。假设分组衰落具有独立的衰落系数,我们使用高信噪比近似来评估该方案的中断概率性能。特别地,我们建立了DFNC的中断概率上界,并将其与空时编码(STC)合作协议和基于重复的(REP)合作协议进行了比较。理论分析和数值结果表明,无论合作节点总数如何,该方案至少在高信噪比区域的中断性能优于STC和REP,并且提供m + 1的分集顺序,而STC和REP提供的分集顺序为m。
{"title":"Outage Performance of DF Network Coded (DFNC) Multi-User Cooperative Diversity in Orthogonal Uplink Channels","authors":"Bin Guo, K. Vardhe, Yu Liu, Chi Zhou, Yu Cheng","doi":"10.1109/GLOCOM.2010.5683704","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683704","url":null,"abstract":"In this paper, we propose a Decode-and-Forward Network Coded (DFNC) multi-user cooperation scheme for orthogonal uplink channels in a wireless network. The network consists of m peers having independent information transmitting to a common destination. Each peer transmits its own data in the first time phase and serves as a relay in the second time phase to transmit the network coded information combining its own and others. Assuming block fading with independent fading coefficients, we evaluate the outage probability performance of the proposed scheme using high-SNR approximation. Particularly, we develop an upper bound on outage probability of DFNC, and compare it with Space-Time-Coded (STC) cooperation protocol and Repetition-based (REP) cooperation protocol. From theoretical analysis and numerical results, we show that the outage performance of proposed scheme outperforms both STC and REP at least in high-SNR region, regardless of total number of cooperating peers and provides diversity order of m + 1 in contrast with diversity order of m provided by STC and REP.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"64 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73350642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MIMO Cross-Layer Secure Communication Architecture Based on STBC 基于STBC的MIMO跨层安全通信体系结构
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684012
H. Wen, G. Gong, P. Ho
The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of wireless networks. In this work, we present a cross-layer security scheme for STBC system. By introducing a distort signal set the sender randomly flip-flops between the distort signal set and the orthogonal code set to confuse the attacker. The physicallayer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.
由于无线传输的广播性质,无线网络缺乏物理边界。在无线网络的物理层中,安全问题已经成为一个重要的问题。在这项工作中,我们提出了一种STBC系统的跨层安全方案。通过引入扭曲信号集,发送方在扭曲信号集和正交码集之间随机切换,迷惑攻击者。因此,物理层的安全性得到了增强。在该方案中,物理层可以依赖于上层加密技术来保证安全,从而形成跨层安全方案。
{"title":"MIMO Cross-Layer Secure Communication Architecture Based on STBC","authors":"H. Wen, G. Gong, P. Ho","doi":"10.1109/GLOCOM.2010.5684012","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684012","url":null,"abstract":"The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of wireless networks. In this work, we present a cross-layer security scheme for STBC system. By introducing a distort signal set the sender randomly flip-flops between the distort signal set and the orthogonal code set to confuse the attacker. The physicallayer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"34 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73676196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Physical Layer Error Correction Based Cipher 基于物理层纠错的密码
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683788
O. Adamo, Shengli Fu, M. Varanasi
In conventional communication systems, error correction is carried out at the physical layer while data security is performed performed at an upper layer. As a result, these steps are done as separate steps. As opposed to this conventional system, we present a scheme that combines error correction and data security as one unit so that both encryption and encoding could be carried out at the physical layer. Hence, in this paper, we present an Error Correction Based Cipher (ECBC) that combines error correction and encryption/decryption in a single step. Encrypting and encoding or decoding and decrypting in a single step will lead to a faster and more efficient implementation. One of the challenges of using previous joint schemes in a communications channel is that there is a tradeoff between data reliability and security. However in ECBC, there is no trade off between reliability and security. Errors introduced at the transmitter for randomization are removed at the receiver. Hence ECBC can utilize its full capacity to correct channel errors. We show the result of randomization test on ECBC and its security against conventional attacks. We also present the result of the FPGA implementation of the ECBC encryption.
在传统通信系统中,纠错是在物理层进行的,而数据安全是在上层进行的。因此,这些步骤是作为单独的步骤完成的。与这种传统系统相反,我们提出了一种将纠错和数据安全作为一个单元的方案,以便加密和编码都可以在物理层进行。因此,在本文中,我们提出了一种基于纠错的密码(ECBC),它将纠错和加密/解密在一个步骤中结合起来。在一个步骤中加密和编码或解码和解密将导致更快和更有效的实现。在通信通道中使用以前的联合方案的挑战之一是在数据可靠性和安全性之间存在权衡。然而,在ECBC中,可靠性和安全性之间没有权衡。在发送端引入的随机化误差在接收端被消除。因此,ECBC可以利用其全部容量来纠正信道错误。我们展示了ECBC的随机化测试结果及其对常规攻击的安全性。我们还给出了用FPGA实现ECBC加密的结果。
{"title":"Physical Layer Error Correction Based Cipher","authors":"O. Adamo, Shengli Fu, M. Varanasi","doi":"10.1109/GLOCOM.2010.5683788","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683788","url":null,"abstract":"In conventional communication systems, error correction is carried out at the physical layer while data security is performed performed at an upper layer. As a result, these steps are done as separate steps. As opposed to this conventional system, we present a scheme that combines error correction and data security as one unit so that both encryption and encoding could be carried out at the physical layer. Hence, in this paper, we present an Error Correction Based Cipher (ECBC) that combines error correction and encryption/decryption in a single step. Encrypting and encoding or decoding and decrypting in a single step will lead to a faster and more efficient implementation. One of the challenges of using previous joint schemes in a communications channel is that there is a tradeoff between data reliability and security. However in ECBC, there is no trade off between reliability and security. Errors introduced at the transmitter for randomization are removed at the receiver. Hence ECBC can utilize its full capacity to correct channel errors. We show the result of randomization test on ECBC and its security against conventional attacks. We also present the result of the FPGA implementation of the ECBC encryption.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"10 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72718457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On Parallel UDP-Based Transport Control over Dedicated Connections 基于并行udp的专用连接传输控制研究
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683484
Xukang Lu, C. Wu, N. Rao, Zongmin Wang
Several research and production high-performance networks now provision multi-Gbps dedicated channels to support large data transfers in network-intensive applications. However, end users have not seen a corresponding increase in application throughput mainly because traditional end-to-end transport methods are not optimized for such connections. New congestion or flow control mechanisms are desirable to meet the challenges brought by dedicated connections to transport protocol design. The advent and proliferation of multi-core processors make it now possible to improve application throughput by providing multiple processing and networking resources to a single data transfer. Based on the existing PLUT method, we propose a new transport method, Para-PLUT, which utilizes multiple parallel UDP connections to take advantage of the full power of multicore processors for maximum aggregate goodput. We implement and test Para-PLUT in a local dedicated network testbed and the experimental results illustrate its superior performance over several existing methods.
一些研究和生产高性能网络现在提供多gbps专用通道,以支持网络密集型应用中的大数据传输。然而,最终用户并没有看到应用程序吞吐量的相应增加,这主要是因为传统的端到端传输方法没有针对这种连接进行优化。新的拥塞或流量控制机制是满足专用连接给传输协议设计带来的挑战所需要的。多核处理器的出现和普及使得现在可以通过为单个数据传输提供多个处理和网络资源来提高应用程序吞吐量。在现有的PLUT方法的基础上,我们提出了一种新的传输方法,Para-PLUT,它利用多个并行UDP连接来利用多核处理器的全部能力来获得最大的聚合吞吐量。我们在本地专用网络测试平台上实现并测试了Para-PLUT,实验结果表明它比几种现有方法具有更好的性能。
{"title":"On Parallel UDP-Based Transport Control over Dedicated Connections","authors":"Xukang Lu, C. Wu, N. Rao, Zongmin Wang","doi":"10.1109/GLOCOM.2010.5683484","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683484","url":null,"abstract":"Several research and production high-performance networks now provision multi-Gbps dedicated channels to support large data transfers in network-intensive applications. However, end users have not seen a corresponding increase in application throughput mainly because traditional end-to-end transport methods are not optimized for such connections. New congestion or flow control mechanisms are desirable to meet the challenges brought by dedicated connections to transport protocol design. The advent and proliferation of multi-core processors make it now possible to improve application throughput by providing multiple processing and networking resources to a single data transfer. Based on the existing PLUT method, we propose a new transport method, Para-PLUT, which utilizes multiple parallel UDP connections to take advantage of the full power of multicore processors for maximum aggregate goodput. We implement and test Para-PLUT in a local dedicated network testbed and the experimental results illustrate its superior performance over several existing methods.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"39 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74554394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Evaluation of Iterative Channel Codes for Digital Data Storage on Microfilm 微胶片上数字数据存储的迭代信道码性能评价
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683965
Florian Pflug, C. Voges, T. Fingscheidt
In the past few years microfilm has gained new research interest as a medium for long-term storage of digital data. This became particularly possible by recent advances in laser film recording technology. In contrast to other optical or magnetic storage media, the microfilm digital channel (MDC) still has been subject to characterization in only a few publications. In this paper we investigate iterative channel codes for the MDC, in particular low-density parity-check and turbo convolutional codes. Simulation results show that practically error-free storage can be achieved with code rates even above 0.85 on a monochrome MDC with binary amplitude-shift keying modulation.
在过去的几年中,缩微胶片作为一种长期存储数字数据的介质获得了新的研究兴趣。由于激光胶片记录技术的最新进展,这一点尤其成为可能。与其他光学或磁性存储介质相比,缩微胶片数字通道(MDC)仍然仅在少数出版物中进行了表征。在本文中,我们研究了MDC的迭代信道码,特别是低密度奇偶校验码和turbo卷积码。仿真结果表明,在二进制移幅键控调制的单色MDC上,即使码率高于0.85,也可以实现几乎无差错的存储。
{"title":"Performance Evaluation of Iterative Channel Codes for Digital Data Storage on Microfilm","authors":"Florian Pflug, C. Voges, T. Fingscheidt","doi":"10.1109/GLOCOM.2010.5683965","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683965","url":null,"abstract":"In the past few years microfilm has gained new research interest as a medium for long-term storage of digital data. This became particularly possible by recent advances in laser film recording technology. In contrast to other optical or magnetic storage media, the microfilm digital channel (MDC) still has been subject to characterization in only a few publications. In this paper we investigate iterative channel codes for the MDC, in particular low-density parity-check and turbo convolutional codes. Simulation results show that practically error-free storage can be achieved with code rates even above 0.85 on a monochrome MDC with binary amplitude-shift keying modulation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78745061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Information-Theoretic Approach to Resource Consumption Minimization for Dynamic Spectrum Access Networks 动态频谱接入网资源消耗最小化的信息论方法
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683153
M. Pursley, IV ThomasC.Royster
Information-theoretic limits on resource consumption are employed to obtain analytical methods for conducting tradeoffs between power, bandwidth, and time for cognitive radio transmissions in ad hoc dynamic spectrum access networks. A quantitative measure of resource consumption is applied to the design and evaluation of protocols for adaptive modulation and coding. The application of information theory to the minimization of resource consumption in cognitive radio networks is illustrated for binary phase-shift-key modulation with coherent demodulation.
利用信息论对资源消耗的限制,获得了在自组织动态频谱接入网络中认知无线电传输的功率、带宽和时间之间进行权衡的分析方法。将资源消耗的定量度量应用于自适应调制和编码协议的设计和评估。本文阐述了信息理论在认知无线网络中对二相移键调制的相干解调中资源消耗最小化的应用。
{"title":"An Information-Theoretic Approach to Resource Consumption Minimization for Dynamic Spectrum Access Networks","authors":"M. Pursley, IV ThomasC.Royster","doi":"10.1109/GLOCOM.2010.5683153","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683153","url":null,"abstract":"Information-theoretic limits on resource consumption are employed to obtain analytical methods for conducting tradeoffs between power, bandwidth, and time for cognitive radio transmissions in ad hoc dynamic spectrum access networks. A quantitative measure of resource consumption is applied to the design and evaluation of protocols for adaptive modulation and coding. The application of information theory to the minimization of resource consumption in cognitive radio networks is illustrated for binary phase-shift-key modulation with coherent demodulation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"15 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72638452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Throughput-Delay Scaling for Two Mobile Overlaid Networks 两个移动覆盖网络的吞吐量-延迟缩放
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683829
W. Zhang, C. Yeo
In this paper, we study the throughput and delay scaling laws of two coexisting mobile networks. By considering that both the primary and secondary networks are mobile and move according to random walk model, we propose a multi-hop transmission scheme. Based on the assumption that the secondary node can help to relay the primary packet, we show that the secondary network can achieve the same throughput and delay scaling laws as in stand-alone network D_s(m)=Θ(mλ_s(m)). Furthermore, for primary network, it is shown that the throughput-delay tradeoff scaling law is given by D_p(n)=Θ(√{nlog{n}}λ_p(n)), when the primary node is chosen as relay node. If the relay node is a secondary node, the scaling law is D_p(n)=Θ(√{n^{β}log{n}}λ_p(n)), where β>1. The novelties of this paper lie in: i) Detailed study of the delay scaling law of the secondary network in the complex scenario where both the primary and secondary networks are mobile; ii) The impact of buffer delay on the primary and secondary networks due to the presence of preservation region. We explicitly analyze the buffer delay and obtain an expression as D^{II}_{S_R}(m)=Θ(1/√{n^{β-1}a_s(m)}).
本文研究了两种共存移动网络的吞吐量和时延缩放规律。考虑到主网络和从网络都是移动的,并且按照随机游走模型移动,我们提出了一种多跳传输方案。基于辅助节点可以帮助中继主数据包的假设,我们证明辅助网络可以实现与独立网络相同的吞吐量和延迟缩放规律D_s(m)=Θ(mλ_s(m))。此外,对于主网络,当选择主节点作为中继节点时,吞吐量-延迟权衡缩放律为D_p(n)=Θ(√{nlog{n}}λ_p(n))。若中继节点为次级节点,则标度规律为D_p(n)=Θ(√{n^{β}log{n}}λ_p(n)),其中β>1。本文的新颖之处在于:1)详细研究了主从网络均为移动网络的复杂场景下副网络的时延缩放规律;ii)由于保留区域的存在,缓冲延迟对主从网络的影响。我们显式地分析了缓冲延迟,得到了D^{II}_{S_R}(m)=Θ(1/√{n^{β-1}a_s(m)})的表达式。
{"title":"Throughput-Delay Scaling for Two Mobile Overlaid Networks","authors":"W. Zhang, C. Yeo","doi":"10.1109/GLOCOM.2010.5683829","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683829","url":null,"abstract":"In this paper, we study the throughput and delay scaling laws of two coexisting mobile networks. By considering that both the primary and secondary networks are mobile and move according to random walk model, we propose a multi-hop transmission scheme. Based on the assumption that the secondary node can help to relay the primary packet, we show that the secondary network can achieve the same throughput and delay scaling laws as in stand-alone network D_s(m)=Θ(mλ_s(m)). Furthermore, for primary network, it is shown that the throughput-delay tradeoff scaling law is given by D_p(n)=Θ(√{nlog{n}}λ_p(n)), when the primary node is chosen as relay node. If the relay node is a secondary node, the scaling law is D_p(n)=Θ(√{n^{β}log{n}}λ_p(n)), where β>1. The novelties of this paper lie in: i) Detailed study of the delay scaling law of the secondary network in the complex scenario where both the primary and secondary networks are mobile; ii) The impact of buffer delay on the primary and secondary networks due to the presence of preservation region. We explicitly analyze the buffer delay and obtain an expression as D^{II}_{S_R}(m)=Θ(1/√{n^{β-1}a_s(m)}).","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"101 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77393711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Iterative Polite Water-Filling for Weighted Sum-Rate Maximization in iTree Networks iTree网络中加权和速率最大化的迭代礼貌充水
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684051
An Liu, Y. Liu, Haige Xiang, Wu Luo
It is well known that in general, the traditional water-filling is far from optimal in networks. We recently found the long-sought network version of water-filling named polite water-filling that is optimal for a large class of MIMO networks called B-MAC networks, of which interference Tree (iTree) networks is a subset whose interference graphs have no directional loop. iTree networks is a natural extension of both broadcast channel (BC) and multiaccess channel (MAC) and possesses many desirable properties for further information theoretic study. Given the optimality of the polite water-filling, general purpose optimization algorithms for networks are no longer needed because they do not exploit the structure of the problems. Here, we demonstrate it through the weighted sum-rate maximization. The significance of the results is that the algorithm can be easily modified for general B-MAC networks with interference loops. It illustrates the properties of iTree networks and for the special cases of MAC and BC, replaces the current steepest ascent algorithms for finding the capacity regions. The fast convergence and high accuracy of the proposed algorithms are verified by simulation.
众所周知,在一般情况下,传统的注水方式在网络中远非最优。我们最近发现了长期寻找的注水网络版本,命名为礼貌注水,它对于称为B-MAC网络的大型MIMO网络是最优的,其中干扰树(iTree)网络是其干扰图没有方向环路的子集。iTree网络是广播信道(BC)和多址信道(MAC)的自然扩展,具有许多值得进一步信息论研究的特性。考虑到礼貌注水的最优性,不再需要网络的通用优化算法,因为它们不利用问题的结构。这里,我们通过加权和速率最大化来演示它。研究结果的意义在于,对于一般的具有干扰环路的B-MAC网络,该算法可以很容易地进行修改。它说明了iTree网络的特性,并针对MAC和BC的特殊情况,取代了目前寻找容量区域的最陡上升算法。仿真结果验证了所提算法的快速收敛性和较高的精度。
{"title":"Iterative Polite Water-Filling for Weighted Sum-Rate Maximization in iTree Networks","authors":"An Liu, Y. Liu, Haige Xiang, Wu Luo","doi":"10.1109/GLOCOM.2010.5684051","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684051","url":null,"abstract":"It is well known that in general, the traditional water-filling is far from optimal in networks. We recently found the long-sought network version of water-filling named polite water-filling that is optimal for a large class of MIMO networks called B-MAC networks, of which interference Tree (iTree) networks is a subset whose interference graphs have no directional loop. iTree networks is a natural extension of both broadcast channel (BC) and multiaccess channel (MAC) and possesses many desirable properties for further information theoretic study. Given the optimality of the polite water-filling, general purpose optimization algorithms for networks are no longer needed because they do not exploit the structure of the problems. Here, we demonstrate it through the weighted sum-rate maximization. The significance of the results is that the algorithm can be easily modified for general B-MAC networks with interference loops. It illustrates the properties of iTree networks and for the special cases of MAC and BC, replaces the current steepest ascent algorithms for finding the capacity regions. The fast convergence and high accuracy of the proposed algorithms are verified by simulation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"35 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77579426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1