首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
We consider power and server allocation in a multibeam satellite downlink which transmits data to N different ground locations over N time-varying channels. Packets destined for each ground location are stored in separate queues and the server rate for each queue, i, depends on the power, p/sub i/(t), allocated to that server and the channel state, c/sub i/(t), according to a concave rate-power curve /spl mu//sub i/(p/sub i/,c/sub i/). We establish the capacity region of all arrival rate vectors (/spl lambda//sub 1/,...,/spl lambda//sub N/) which admit a stabilizable system. We then develop a power-allocation policy which stabilizes the system whenever the rate vector lies within the capacity region. Such stability is guaranteed even if the channel model and the specific arrival rates are unknown. Furthermore, the algorithm is shown to be robust to arbitrary variations in the input rates and a bound on average delay is established. As a special case, this analysis verifies stability and provides a performance bound for the choose-the-K-largest-connected-queues policy when channels can be in one of two states (ON or OFF ) and K servers are allocated at every timestep (K相似文献   

2.
Wireless planar networks have been used to model wireless networks in a tradition that dates back to 1961 to the work of E. N. Gilbert. Indeed, the study of connected components in wireless networks was the motivation for his pioneering work that spawned the modern field of continuum percolation theory. Given that node locations in wireless networks are not known, random planar modeling can be used to provide preliminary assessments of important quantities such as range, number of neighbors, power consumption, and connectivity, and issues such as spatial reuse and capacity. In this paper, the problem of connectivity based on nearest neighbors is addressed. The exact threshold function for /spl theta/-coverage is found for wireless networks modeled as n points uniformly distributed in a unit square, with every node connecting to its /spl phi//sub n/ nearest neighbors. A network is called /spl theta/-covered if every node, except those near the boundary, can find one of its /spl phi//sub n/ nearest neighbors in any sector of angle /spl theta/. For all /spl theta//spl isin/(0,2/spl pi/), if /spl phi//sub n/=(1+/spl delta/)log/sub 2/spl pi//2/spl pi/-/spl theta//n, it is shown that the probability of /spl theta/-coverage goes to one as n goes to infinity, for any /spl delta/>0; on the other hand, if /spl phi//sub n/=(1-/spl delta/)log/sub 2/spl pi//2/spl pi/-/spl theta//n, the probability of /spl theta/-coverage goes to zero. This sharp characterization of /spl theta/-coverage is used to show, via further geometric arguments, that the network will be connected with probability approaching one if /spl phi//sub n/=(1+/spl delta/)log/sub 2/n. Connections between these results and the performance analysis of wireless networks, especially for routing and topology control algorithms, are discussed.  相似文献   

3.
The topology of a wireless multi-hop network can be controlled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based distributed topology-control (CBTC) algorithm. This algorithm does not assume that nodes have GPS information available; rather it depends only on directional information. Roughly speaking, the basic idea of the algorithm is that a node u transmits with the minimum power p/sub u,/spl alpha// required to ensure that in every cone of degree /spl alpha/ around u, there is some node that u can reach with power p/sub u,/spl alpha//. We show that taking /spl alpha/=5/spl pi//6 is a necessary and sufficient condition to guarantee that network connectivity is preserved. More precisely, if there is a path from s to t when every node communicates at maximum power then, if /spl alpha//spl les/5/spl pi//6, there is still a path in the smallest symmetric graph G/sub /spl alpha// containing all edges (u,v) such that u can communicate with v using power p/sub u,/spl alpha//. On the other hand, if /spl alpha/>5/spl pi//6, connectivity is not necessarily preserved. We also propose a set of optimizations that further reduce power consumption and prove that they retain network connectivity. Dynamic reconfiguration in the presence of failures and mobility is also discussed. Simulation results are presented to demonstrate the effectiveness of the algorithm and the optimizations.  相似文献   

4.
Network information flow with correlated sources   总被引:2,自引:0,他引:2  
Consider the following network communication setup, originating in a sensor networking application we refer to as the "sensor reachback" problem. We have a directed graph G=(V,E), where V={v/sub 0/v/sub 1/...v/sub n/} and E/spl sube/V/spl times/V. If (v/sub i/,v/sub j/)/spl isin/E, then node i can send messages to node j over a discrete memoryless channel (DMC) (X/sub ij/,p/sub ij/(y|x),Y/sub ij/), of capacity C/sub ij/. The channels are independent. Each node v/sub i/ gets to observe a source of information U/sub i/(i=0...M), with joint distribution p(U/sub 0/U/sub 1/...U/sub M/). Our goal is to solve an incast problem in G: nodes exchange messages with their neighbors, and after a finite number of communication rounds, one of the M+1 nodes (v/sub 0/ by convention) must have received enough information to reproduce the entire field of observations (U/sub 0/U/sub 1/...U/sub M/), with arbitrarily small probability of error. In this paper, we prove that such perfect reconstruction is possible if and only if H(U/sub s/ | U/sub S(c)/) < /spl Sigma//sub i/spl isin/S,j/spl isin/S(c)/ for all S/spl sube/{0...M},S/spl ne/O,0/spl isin/S(c). Our main finding is that in this setup, a general source/channel separation theorem holds, and that Shannon information behaves as a classical network flow, identical in nature to the flow of water in pipes. At first glance, it might seem surprising that separation holds in a fairly general network situation like the one we study. A closer look, however, reveals that the reason for this is that our model allows only for independent point-to-point channels between pairs of nodes, and not multiple-access and/or broadcast channels, for which separation is well known not to hold. This "information as flow" view provides an algorithmic interpretation for our results, among which perhaps the most important one is the optimality of implementing codes using a layered protocol stack.  相似文献   

5.
A minimum cost heterogeneous sensor network with a lifetime constraint   总被引:5,自引:0,他引:5  
We consider a heterogeneous sensor network in which nodes are to be deployed over a unit area for the purpose of surveillance. An aircraft visits the area periodically and gathers data about the activity in the area from the sensor nodes. There are two types of nodes that are distributed over the area using two-dimensional homogeneous Poisson point processes; type 0 nodes with intensity (average number per unit area) /spl lambda//sub 0/ and battery energy E/sub 0/; and type 1 nodes with intensity /spl lambda//sub 1/ and battery energy E/sub 1/. Type 0 nodes do the sensing while type 1 nodes act as the cluster heads besides doing the sensing. Nodes use multihopping to communicate with their closest cluster heads. We determine them optimum node intensities (/spl lambda//sub 0/, /spl lambda//sub 1/) and node energies (E/sub 0/, E/sub 1/) that guarantee a lifetime of at least T units, while ensuring connectivity and coverage of the surveillance area with a high probability. We minimize the overall cost of the network under these constraints. Lifetime is defined as the number of successful data gathering trips (or cycles) that are possible until connectivity and/or coverage are lost. Conditions for a sharp cutoff are also taken into account, i.e., we ensure that almost all the nodes run out of energy at about the same time so that there is very little energy waste due to residual energy. We compare the results for random deployment with those of a grid deployment in which nodes are placed deterministically along grid points. We observe that in both cases /spl lambda//sub 1/ scales approximately as /spl radic/(/spl lambda//sub 0/). Our results can be directly extended to take into account unreliable nodes.  相似文献   

6.
施玉晨  白宝明 《信号处理》2011,27(3):407-411
针对反射、散射影响下的非对称无线协作通信网络,提出了一种时变功率分配(Time Variant Power Allocation, TVPA)算法。根据无线协作网络中,各节点之间信道条件实时变化且不对称的特点,在信号传输过程中对信源节点和中继节点的发送信号功率进行优化分配。借助信道编码定理,将系统错误概率最小的非凸优化问题转化为最大化系统容量的凸优化问题来解。与固定功率分配(Fixed Power Allocation, FXPA)算法和平均功率分配(Average Power Allocation, AVPA)算法相比,该算法能充分利用无线信道的时变特性,重新分配功率以降低系统错误概率。在多种网络模型中的仿真结果表明,准静态瑞利衰落信道下,相比于FXPA算法,TVPA算法可获得多达5.5dB的比特错误概率性能增益。随着网络质量的进一步改善,该性能优势也逐步增大。   相似文献   

7.
We show that for the case of the binary-symmetric channel and Gallager's decoding algorithm A the threshold can, in many cases, be determined analytically. More precisely, we show that the threshold is always upper-bounded by the minimum of (1-/spl lambda//sub 2//spl rho/'(1))/(/spl lambda/'(1)/spl rho/'(1)-/spl lambda//sub 2//spl rho/'(1)) and the smallest positive real root /spl tau/ of a specific polynomial p(x) and we observe that for most cases this bound is tight, i.e., it determines the threshold exactly. We also present optimal degree distributions for a large range of rates. In the case of rate one-half codes, for example, the threshold x/sub 0//sup */ of the optimal degree distribution is given by x/sup *//sub 0//spl sim/0.0513663. Finally, we outline how thresholds of more complicated decoders might be determined analytically.  相似文献   

8.
A new monolithic microwave integrated circuit power amplifier for 802.11b/g wireless local area network (WLAN) has been implemented using the load modulation concept of a Doherty amplifier. The /spl lambda//4 transmission line for the load modulation circuit of the carrier amplifier is replaced by a lumped element based /spl pi/-network, which dual functions as an output matching network, simultaneously. This amplifier shows that error vector magnitude is about 4.6% and power added efficiency (PAE) about 31.8% at P/sub out/ of 19 dBm for a 802.11g 64QAM signal. PAE of the power amplifier is about 49.6%, and adjacent channel leakage ratio below 37.2dBc at 11 MHz offset at P/sub out/ of 23 dBm for the 802.11b complementary code keying signal  相似文献   

9.
提出了多中继无线通信系统的模型,研究其源节点和各中继节点间功率分配对系统容量的影响,在总功率一定的情况下,探讨了以容量最大化为准则的功率分配算法。对采用非再生协作中继方式的多中继协作通信系统进行了容量分析,并提出了一种低复杂度的最优功率分配算法(Optimum Power Allocation,OPA)。仿真结果表明,该算法相对于平均功率分配算法(Average Power Allocation,APA),系统容量得到了显著提高,在信道条件差的情况下,性能提高更明显。  相似文献   

10.
A waveguide propagating the TE/sub 10/ mode can carry more power than the normal rectangular waveguide if it has a symmetrically placed channel in the E-plane as shown in fig. 1. The greater height of the channel in the center of the waveguide will allow a higher voltage to be applied before dielectric breakdown occurs. The TE/sub 10/ cutoff wavelength /spl lambda//sub c/ was investigated using the methods of Iashkin and Cohn to find out if the cutoff wavelength of the channel waveguide was equivalent to that of the rectangular waveguide /spl lambda//sub cr/.  相似文献   

11.
Nodes in wireless ad hoc networks may become inactive or unavailable due to, for example, internal breakdown or being in the sleeping state. The inactive nodes cannot take part in routing/relaying, and thus may affect the connectivity. A wireless ad hoc network containing inactive nodes is then said to be connected, if each inactive node is adjacent to at least one active node and all active nodes form a connected network. This paper is the first installment of our probabilistic study of the connectivity of wireless ad hoc networks containing inactive nodes. We assume that the wireless ad hoc network consists of n nodes which are distributed independently and uniformly in a unit-area disk, and are active (or available) independently with probability p for some constant 0

相似文献   


12.
13.
This paper investigates joint power control and routing policies for general multihop wireless networks when all the transmitting nodes are subject to a long-term average power constraint. The main contribution of this paper is to propose online power and rate control algorithms and prove that these policies stabilize the entire queuing network whenever the packet arrival rates at each node are in the corresponding region of achievable rates. The online policies are time varying and based on the queue size at each node and the instantaneous channel conditions. The theoretical results are supported by simulations for the illustrative cases of both a multiple-access channel and a relay channel.  相似文献   

14.
In this paper, we propose a cross layer congestion optimization scheme for allocating the resources of wireless sensor networks to achieve maximization of network performance. The congestion control, routing selection, link capacity allocation, and power consumption are all taken account to yield an optimal scheme based on the Lagrangian optimization. The Lagrangian multiplier is adopted to adjust power consumption, congestion rate, routing selection and link capacity allocation, so that the network performance can be satisfied between the trade-off of efficiency and fairness of resource allocation. The proposed algorithm can significantly achieve the maximization of network performance in relieving the network congestion with less power consumption. Excellent simulation results are obtained to demonstrate our innovative idea, and show the efficiency of our proposed algorithm.  相似文献   

15.
We investigate the computation of Csisza/spl acute/r's bounds for the joint source-channel coding (JSCC) error exponent E/sub J/ of a communication system consisting of a discrete memoryless source and a discrete memoryless channel. We provide equivalent expressions for these bounds and derive explicit formulas for the rates where the bounds are attained. These equivalent representations can be readily computed for arbitrary source-channel pairs via Arimoto's algorithm. When the channel's distribution satisfies a symmetry property, the bounds admit closed-form parametric expressions. We then use our results to provide a systematic comparison between the JSCC error exponent E/sub J/ and the tandem coding error exponent E/sub T/, which applies if the source and channel are separately coded. It is shown that E/sub T//spl les/E/sub J//spl les/2E/sub T/. We establish conditions for which E/sub J/>E/sub T/ and for which E/sub J/=2E/sub T/. Numerical examples indicate that E/sub J/ is close to 2E/sub T/ for many source-channel pairs. This gain translates into a power saving larger than 2 dB for a binary source transmitted over additive white Gaussian noise (AWGN) channels and Rayleigh-fading channels with finite output quantization. Finally, we study the computation of the lossy JSCC error exponent under the Hamming distortion measure.  相似文献   

16.
Let GR(4/sup m/) be the Galois ring of characteristic 4 and cardinality 4/sup m/, and /spl alpha/_={/spl alpha//sub 0/,/spl alpha//sub 1/,...,/spl alpha//sub m-1/} be a basis of GR(4/sup m/) over /spl Zopf//sub 4/ when we regard GR(4/sup m/) as a free /spl Zopf//sub 4/-module of rank m. Define the map d/sub /spl alpha/_/ from GR(4/sup m/)[z]/(z/sup n/-1) into /spl Zopf//sub 4/[z]/(z/sup mn/-1) by d/spl alpha/_(a(z))=/spl Sigma//sub i=0//sup m-1//spl Sigma//sub j=0//sup n-1/a/sub ij/z/sup mj+i/ where a(z)=/spl Sigma//sub j=0//sup n-1/a/sub j/z/sup j/ and a/sub j/=/spl Sigma//sub i=0//sup m-1/a/sub ij//spl alpha//sub i/, a/sub ij//spl isin//spl Zopf//sub 4/. Then, for any linear code C of length n over GR(4/sup m/), its image d/sub /spl alpha/_/(C) is a /spl Zopf//sub 4/-linear code of length mn. In this article, for n and m being odd integers, it is determined all pairs (/spl alpha/_,C) such that d/sub /spl alpha/_/(C) is /spl Zopf//sub 4/-cyclic, where /spl alpha/_ is a basis of GR(4/sup m/) over /spl Zopf//sub 4/, and C is a cyclic code of length n over GR(4/sup m/).  相似文献   

17.
Multihop infrastructure wireless mesh networks offer increased reliability, coverage, and reduced equipment costs over their single-hop counterpart, wireless local area networks. Equipping wireless routers with multiple radios further improves the capacity by transmitting over multiple radios simultaneously using orthogonal channels. Efficient channel assignment and routing is essential for throughput optimization of mesh clients. Efficient channel assignment schemes can greatly relieve the interference effect of close-by transmissions; effective routing schemes can alleviate potential congestion on any gateways to the Internet, thereby improving per-client throughput. Unlike previous heuristic approaches, we mathematically formulate the joint channel assignment and routing problem, taking into account the interference constraints, the number of channels in the network, and the number of radios available at each mesh router. We then use this formulation to develop a solution for our problem that optimizes the overall network throughput subject to fairness constraints on allocation of scarce wireless capacity among mobile clients. We show that the performance of our algorithms is within a constant factor of that of any optimal algorithm for the joint channel assignment and routing problem. Our evaluation demonstrates that our algorithm can effectively exploit the increased number of channels and radios, and it performs much better than the theoretical worst case bounds  相似文献   

18.
This paper studies dynamic resource allocation in a decentralized communication network. The temporal aspect in the decentralized resource allocation problem presents new challenges, e.g., in optimizing the delay-throughput trade-off under user-specific delay costs. A dynamic bandwidth allocation game modelling an agent-based network is presented. The dynamic noncooperative game achieves Pareto-efficient bandwidth allocation that can be implemented by a greedy algorithm with pricing. Optimal dynamic pricing is discussed for the efficient sharing of network resources. An ad hoc wireless network is an example of such self-organizing decentralized system: the mobile nodes need not be directly connected to a base station. Another application of the model is to consider distributed uplink scheduling, based on local information, in a WCDMA network. The discretized control variable of a mobile node is either the received power/QoS-level or the binary decision on packet transmission.  相似文献   

19.
In this paper, an analytical framework is proposed for the optimization of network performance through joint congestion control, channel allocation, rate allocation, power control, scheduling, and routing with the consideration of fairness in multi‐channel wireless multi‐hop networks. More specifically, the framework models the network by a generalized network utility maximization (NUM) problem under an elastic link data rate and power constraints. Using the dual decomposition technique, the NUM problem is decomposed into four subproblems — flow control; next‐hop routing; rate allocation and scheduling; power control; and channel allocation — and finally solved by a low‐complexity distributed method. Simulation results show that the proposed distributed algorithm significantly improves the network throughput and energy efficiency compared with previous algorithms.  相似文献   

20.
The importance of spatial reuse in wireless ad-hoc networks has been long recognized as a key to improving the network capacity. In this paper, we show that (i) in the case that the achievable channel rate follows the Shannon capacity, spatial reuse depends only on the ratio of the transmit power to the carrier sense threshold; and (ii) in the case that only a set of discrete data rates are available, as a control knob for sustaining achievable data rates, tuning the transmit power provides more sophisticated rate control over tuning the carrier sense threshold, provided that there is a sufficient number of power levels available. Based on the findings, we then propose a decentralized power and rate control algorithm to enable each node to adjust, based on its signal interference level, its transmit power and data rate. The transmit power is so determined that the transmitter can sustain a high data rate, while keeping the adverse interference effect on the other neighboring concurrent transmissions minimal. Simulation results have shown that, as compared to existing carrier sense threshold tuning algorithms, the proposed power and rate control algorithm yields higher network capacity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号