Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Size: px
Start display at page:

Download "Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users"

Transcription

1 Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University, Evanston, IL 68 USA junjik@northwestern.edu,{rberry,mh}@ece.northwestern.edu Abstract We study the downlink coverage of a base station terminal (T), which has access to a relay node. Continuing a previous study in which the T is assumed to provide a variable-rate data service, here we assume that each active user requires a target data rate, corresponding to a voice type of service. The relay is assumed to serve a separate set of (noncellular) users, corresponding to a WiFi Access Point (). A one-dimensional model is considered in which cellular and noncellular users are uniformly distributed along a line. The T and jointly allocate available power across users and the T- link to imize the total number of users served. We characterize the optimized set of active cellular users served by the T directly and the relay, and the non-cellular users served by the. We also give a closed-form upper bound on the increase in the total number of users provided by the relay as a function of user densities and path loss exponents. Our results show that depending on the distance between the T and the, the addition of a relay gives a modest increase in the total number of active users. I. INTRODUCTION Adding fixed relays to a cellular network can potentially increase the network capacity and extend network coverage [] [5], [7]. This has motivated the introduction of relays in emerging standards such as 8.6j [8] and 4G mobile systems [9]. Rather than deploying new cellular relays, in some cases, it may be possible for a cellular service provider to use an existing wireless LAN (WLAN) access point () as a relay for cellular traffic [6]. In that case, although the potentially brings additional resources to the cellular network, those resources must be allocated across both WLAN and cellular user requests. Previous studies on relay-assisted cellular systems have generally assumed that the relays are dedicated to serving only cellular users (e.g., see [3] [5], and [6], where relays are proposed to relieve congestion in a particular cell by siphoning off traffic to neighboring cells). This paper is continuation of previous work [7] in which we evaluate the increase in downlink capacity (sum data rate over all users) associated with the addition of a relay to a single cell in a cellular network. Whereas [7] evaluates a sum data rate, which corresponds to a data type of service, here we assume a voice type of service in which each user requires a target data rate. The system objective is then to imize the total number of users served by both the cellular system and the. This work was supported by the Motorola-Northwestern Center for Telecommunications. As in [7], we consider a single one-dimensional cell with two relays ( nodes) symmetrically placed on either side of the Base STation (T), and a static user population. Both the cellular users and non-cellular users, served by the, are assumed to be continuously and uniformly distributed along the line with given densities. This corresponds to the large system model presented in []. All users (both cellular and ) are assumed to be orthogonal in time, frequency, and/or signature space, and do not interfere. Furthermore, the is assumed to use a different band from the cellular band, so that cellular users do not interfere with non-cellular users. Also, here we consider only the power allocation problem subject to a total power constraint. We assume that each user receives a single unit of bandwidth (i.e., channel, time slot, or signature), and that the total number of users does not exceed a bandwidth constraint. Finally, in the model considered here path loss is determined only by distance. Random propagation effects, such as shadowing, are not explicitly modeled, but can be incorporated in the model by changing the distance metric. Our problem is to allocate available T and power across both cellular and users, as well as to the link from the T to the, to imize the total number of active users. We solve this problem for the following two scenarios: (i) the information flows to the cellular users served by the relay are jointly encoded and transmitted from the T to the ; and (ii) the preceding information flows are transmitted in parallel (separately encoded) from the T to the. Joint encoding requires less power to transmit the data destined for relayed users from the T to the, but requires that the received data at the be demultiplexed. We also give an upper bound on the increase in total number of users provided by the, based on the scenario in which the T and have a wireline connection, so that the T does not expend any power to communicate with the. The optimization of power across users determines intervals of cellular users served by the T directly, relayed cellular users, and non-cellular users. The relative position of these intervals depends on the T and power constraints, the path loss exponents associated with the cellular, non-cellular, and T- links, and the user densities. We give numerical examples, which show that the total number of active users can This change in distance metric effectively amounts to changing the distribution of users along the line.

2 Fig.. γ P T for Total flow conservation P B (x) for Individual Flow Conservation P B (r) P A (x) r Distance d P A (x) One-dimensional model of a cell with relay nodes (s). be increased by more than 5% if the position of the relay is optimized. If the has no users to serve, then the increase in the number of the cellular users can be more than 35%. Jointly encoding the information from the T to the is shown to result in only a small performance gain. II. SYSTEM MODEL The one-dimensional cellular model is illustrated in Fig.. We assume a symmetric cell in which two s are placed at the same distance d from the T. As in [7], [], we assume a static set of users, which are uniformly and continuously distributed along the line. The density of the cellular users, served by the T, is ρ B, and the density of the users is ρ A. This corresponds to a large system limit in which the number of users in the system tends to infinity in proportion with the available bandwidth (i.e., fixed users per Hz). Given a finite total power constraint, the T and each serve a finite number of users. In what follows, we assume that each active user receives a fixed unit of bandwidth, and that the corresponding number of available channels (and/or time slots and/or signatures) exceeds the total number of active users. All users are therefore assumed to be orthogonal, i.e., they do not interfere. We first consider the situation in which the T does not use the as a relay. From symmetry, we need only consider the power allocation and set of active users on one side of the T. Because each active user receives a target rate, our objective is to imize the number of active users for a given power constraint. Assuming a path loss of /r a, where a is the path-loss exponent, and optimal coding, the power needed to transmit at rate R B to a cellular user at distance r is P B (r) = ( R B W B e W B ) r a Br a, where is the noise density and W B is the cellular bandwidth per user. The imum number of cellular users that the T can support with power P is then ρ B C, where C is the length of the interval containing x the active users and satisfies C ρ B P B (r)dr = P, i.e., ( a + C = ρ B B P. () Similarly, assuming non-cellular and cellular users have the same path-loss exponents, the minimum power needed by the to transmit at rate R A to a user at distance x is P A (x) = ( R A W A e W A ) x a Ax a, where W A is the bandwidth per user. The imum number of non-cellular users that the can support with power P is therefore ρ A D, where D = ( P ρ AA is the one-sided coverage (i.e., for users at distance d + x, with x ). 3 Therefore, without relaying, the total number of active cellular and non-cellular users (on one side of the T) is ρ B C + ρ A D. Now we consider the case where the T uses the to relay voice traffic to cellular users. We assume that a cellular user receives data either from the T directly or through, but not simultaneously. 4 The presence of the relay adds a flow conservation constraint, namely, the total rate that the provides to cellular (relayed) users must be the same as the total rate it receives from the T. With target rates R B and R A for T and users, respectively, the power allocation problem is then to imize the total number of T and users, namely, ρ B C + ρ A D, () {C,D} subject to the power and flow conservation constraints. Here, C and D are the regions of active cellular and one-sided non-cellular users, respectively, and denotes the size (i.e. Lebesgue measure) of the corresponding region. It can be easily shown that D is always a single connected interval. However, since each cellular user can receive data from either the T or, the cellular coverage set C can consist of two or more disjoint intervals C d and C r, where C d = i C d,i is the union of non-overlapping intervals corresponding to the direct (non-relayed) cellular users and similarly, C r corresponds to the relayed users. We assume that C r is one (connected) segment. In what follows, we consider two different techniques for coding the streams transmitted from the T to the for the relayed users. Joint coding or total flow rate conservation assumes that the T jointly encodes all of the data destined for relayed users, and transmits the resulting stream to the. The then decodes and demultiplexes the individual data flows. In that case, the total data rate from the T to the is equal to the sum rate of the flows to relayed users. In the second technique, individual flow rate conservation, data flows, which are to be relayed by the, are transmitted in parallel from the T to the. The then decodes the The total T power for users on both sides of the T is then P. 3 Note we are assuming that the coverage region is symmetric about the location. This will only be the case if D d, which implies P ρ AA d. Otherwise the coverage would be bounded on the left at zero (since the other users would be covered by the to the left of the T). 4 This is in contrast to the model for data service considered in [7] where the T and can simultaneously transmit to a user.

3 packets for each data flow separately. Hence the code rate used by the T to transfer the data to the is the same as that used by the to transmit to the relayed user. Total flow rate conservation generally requires less power for the T- link than individual flow rate conservation, but is more complex, since the relayed users must be multiplexed at the T and demultiplexed at the. III. TOTAL FLOW RATE CONSERVATION The optimization problem in this case is to imize () subject to ρ B P B (r) dr + γp C d ρ A P A (x) dx + D W BA log ( + P, (3) ρ B P A(x) dx P, (4) C r ) γp W BA d b = R B ρ B C r, (5) C = C r C d, C r C d =, γ [, ] (6) where W BA is the bandwidth between the T and the, and γ is a variable to be optimized over indicating the fraction of T power allocated to the relay channel. The power allocation for a relayed cellular user at distance x from the is P A (x) = N ( R B W A e W A ) x a = A x a. The pathloss exponent between the T and the is b, which can differ from the direct path-loss exponent a. That is, through proper placement of the, we may have b < a. Constraints (3) and (4) are the total power constraints for the T and, respectively, and (5) is the total flow rate conservation. To solve this optimization problem, we first assume that the allocates power αp for relayed cellular users, where α [, ], and subsequently optimize over α. With this assumption the preceding problem decomposes into two independent optimization problems for the T users and the users. Given α, the optimization problem is to imize the number of active non-cellular users. The solution ( α)p is ρ A D(α), where D(α) = ( ρ AA. The T optimization problem is to imize the coverage of the cellular users C(α). To solve the T optimization problem, we first write constraints on the interval containing relayed users, which follow from the power allocation αp and the T power allocation γp. Denote the interval of relayed users by [d+x, d+ x], where x d. Given x, from (4) x x A (x), where x A (x) is the value of x that satisfies x x ρ B P A (x) dx = αp. (7) Likewise, from (5), we have x x B (x), where x B (x) = x + W BA log ( + R B ρ B Combining these, we must have that γp W BA d b ). (8) x x(x) min{ x A (x), x B (x)}. (9) Given α and γ, to imize the total coverage this bound will be met with equality. The T allocates ( γ)p for the direct-path cellular users. Consider the two possible inequalities d+x ρ B P B (r) dr ( γ)p. () The left side of the inequality is the T power required to activate users in the interval (, d + x). This can be rewritten as ( a + x x = ( γ)p d, () ρ B B where [, d + x] is the largest interval of users which can be served directly by the T given the available power. For a given interval of relayed users [d + x, d + x], if x > x, then there is a gap between the cellular users served directly by the T and the cellular users served by the. The total cellular user coverage is then C(γ, α, x) = d + x + x x. () If x x, then there is no gap in the coverage of cellular users. That is, the T power needed to activate users in [, d+x] is less than ( γ)p. Hence, there will be a second interval of cellular users served directly by the T given by [d + x, C(γ, α, x)], where C(γ, α, x) = [ (d + x) + (d + x) (d + x) ] (3) is the total cellular coverage. Given α, the T optimization problem reduces to optimizing x, which determines the interval of relayed users, and γ, i.e., C(α) = C(α, γ, x). (4) γ x d Finally, the imum total number of users served by both the T and is given by ρ B C(α) + ρ A D(α). (5) α Although we are unable to obtain a closed-form solution to the preceding optimization problem, we can follow the approach in [7] to derive a closed-form upper bound on the total number of users served by the T and. Namely, we assume that the connection between the T and is free, i.e., does not require any expenditure of power. This could correspond to the situation in which there is a wired connection between the T and the. In that case, the intervals of users served by the T and have lengths ( a + C W L, = ρ B B P ( ρb A /a + + ( a + P ρ A A /a ) ρ B A /a, (6)

4 ( a + D W L, = P ( ρb A + /a ρ ) A A /a A /a (7) provided that the distance d between the T and the is large enough so that there is no coverage overlap between the users directly served by the T and the relayed users. The relative increase in the total number of users due to the addition of the relay is then ρ B C W L, + ρ A D W L, ρ B C + ρ A D + = ( P P ( B /a A /a ( ) a ( + ρa B P ρ B A ) + ρa B /a a ρ B A /a P. (8) If the does not have a separate set of non-cellular users to serve (ρ A = ), then this ratio becomes ρ B C W L, + ρ A D W L, ( B P = + ρ B C + ρ A D A. P (9) Even with a wired connection between the T and, the preceding bound is not tight unless the distance d between the T and is large enough so that the intervals covered by T and do not overlap. With small d this bound can be improved by optimizing the total number of users served over x and α as before, assuming that the T- link requires no power consumption (since the T- link requires no power, we no longer have to optimize over γ). IV. INDIVIDUAL FLOW RATE CONSERVATION Next we consider individual flow rate conservation. The T individually encodes all data destined to the relayed users and transmits these individual streams in parallel to the. to the relayed users, we can again decompose the optimization problem () into two separate problems. The problem is still the same as the one for total flow rate conservation. The T problem for given Assuming the allocates power αp user density ρ B now becomes imizing the cellular user coverage C = C d + C r subject to ρ B P B (r) dr + ρ B P B (d) dx P, () C d C r C r ρ B P A(x) dx αp. () Note in this case, () combines the T power constraint and the total flow constraint; namely, P B (d) = Bd a is the power required from the T to deliver each relayed flow to the. As before, C d and C r are also constrained to be disjoint sets. To simplify our discussion, first we consider the case where b = a, i.e., the path-loss between the T and the is the same as the path-loss between the T and each cellular user. Then for a cellular user at distance r < d, the T will not receive any power savings by using the relay. Therefore, if the T power P is less than ρbb d, the T will not use the relay even when α >. In this case, the total coverage is C(α) = C = ( ρ P BB < d. However, if P > ρbb d, using the relay reduces the power needed by the T. Again, denote the interval of relayed users by [d + x, d + x]. Given x and α, x is again constrained by x x A (x), where x A (x) is the value of x that satisfies (7). The following proposition shows that when the relay is used, the optimal relay user interval starts at x =. Proposition : Given power αp and b = a, if > ρbb d, then the optimal relay user interval is P given by [d, d + x], where x x A (). We omit the proof to save space. Note the constraint x x A () may not be tight if the T does not have enough power to relay sufficient traffic to utilize all the allocated power. In this case, x can be calculated from (). Next, we consider the case where the path-loss between the T and the is /r b, where b < a. In this case, the power required by the T to transmit directly to a user at distance r at rate R B is P B (r) = Br a and the power required by the T to transmit a relayed packet to the for this user is P B (d) = Bd b. Hence, the T can save the power by using the relay if r > d = d b/a. When the T power is small enough so that it can only serve users at distance less than d, it will not usethe relay. As its power increases, it will begin to serve the relayedusers. Initially, the set of relayed users will lie in a symmetric interval around the. Given power, let [d, d + ] be the largest symmetric interval of relyed users that can be supported around the, i.e., = ( αp ρ BA. As the T power further increases, the resulting coverage will follow two possible evolutions, depending on whether or not d d. Two examples of this evolution are shown in Figure. On the left is the case where d d. In this case the relay always serves a symmetric set of cellular users, and as the T power increases, it will eventually serve some users to the right of the relayed set. On the right is the case where d < d. In this case, when there is sufficient relayed traffic, the relayed set is not symmetric, but extends further in the positive direction. This is because the users to the left are served directly by the T. For the former case (d d ), the coverage as a function of the T power is given in table I; we have derived a similar table for the latter case, but omit it due to space considerations. αp In Table I, P (critical) represents the minimum power such that when P > P (critical), the T serves users to the right of the relayed interval. In this case, the cellular coverage as a function of x becomes [ a + C(α, x) = ρ B B P + (d + x A (x)) (a + )d b (x A (x) x) (d + x) ], () where x is constrained to be no smaller than min{, d d}. Therefore, the optimal cellular coverage for a given α is C(α) = C(α, min{x, ẋ}), (3)

5 TABLE I CELLULAR COVERAGE AS A FUNCTION OF P WHEN b < a AND d d. A B C D P T Power P < P ρ BB d P ρ BB d C(α) = C = T coverage C(α) ρ B B P + ρ B Bd b C(α) = d + P ρ B B ρ B Bd b (critical) P d n `P ρ B B ρ BBd b o + = ρ BB (d ) + ρ B Bd b C(α) = P > P (critical) C(α) See eq. () and (3) Fig.. Cellular user coverage as a function of P. On the left is the case where d d and on the right the case where d < d. where x and ẋ are obtained by solving C(α,x) x x=x = and C(α, ẋ) = d + x A (ẋ), respectively. As in Section III, given C(α), the optimal number of cellular and users can then be found by searching for the optimal α [, ]. V. NUMERICAL RESULTS We next give some numerical results to illustrate the gains from relaying under the two flow rate conservation constraints. First, we consider total flow rate conservation. Figure 3 shows the ratio of the total number of users (T+) with relaying to those without relaying as a function of distance d between the T and the. Two different path loss scenarios are considered: a = 4, b = 3 and a = b = 4, with the remaining parameters indicated in the caption. For each case the ratio of the total number of cellular users is also shown (T only). Note there is clearly an optimal location for imizing each of these ratios. When the path-loss exponent b between the T and the is the same as the path-loss exponent a between the T and each user, the increase in the total number of active users with the relay is very small (less than 7% when a = b = 4). As the path-loss between the T and the improves, however, the ratio of the total number of users increases more significantly. The relay achieve more than a 7.8% increase in total number of users served when a = 4 and b = 3. In this case the cellular users served increase by more than 34.9%. (This is offset by a decrease in the number of users.) It follows that the increase in the total number of cellular user is larger than 34.9% when the only serves as a relay (i.e., ρ A = ). The upper bound we obtained by assuming the wired connection between the T and the for d = 4.5 is. (.3 for d = ), and the loss due to the power consumption on the back-haul link between the T and the is small in this example. This is partially because we only consider one. In a two dimensional model that has more s, the back-haul wireless communication loss should be larger. Fig. 4 shows the ratio of total number of users as a when a = 4 and b = 3, assuming the is located d = 4.5 from the T. It can be seen that there is an optimal power which imizes this gain; in this case this is approximately the power used in Figure 3. Figures 5 and 6 show the analogous results under the individual flow conservation constraint. These figures are very similar to those with total flow conservation. Interestingly, the imum gains occur at similar power levels and locations in the two cases. In this case, the gains are slightly lower due to the increased power needed for the backhaul link. For example, in the case of a = 4, b = 3, the imum percentage increase in the total number of users served is about 6.6% (v.s. 7.8% in the total flow case). In these examples the gain from joint encoding is very small, and may not warrant the additional implementation complexity required. function of P VI. CONCLUSION We have studied the total number of downlink voice users in a one dimensional model of a single cell site when two s located symmetrically around a T are available as relays. In addition to relay traffic, we assumed that the has its own customers to serve. We studied two different flow conservation schemes which correspond to whether or not the relay traffic is multiplexed when sent to the. Our results show that when the sets of active users are optimized, the total number of cellular users increases significantly under both flow rate conservation schemes, but at the cost of reducing the users. This corresponds to a coverage extension of the cellular network. Although the relay schemes considered in this paper increase the coverage of the T, it is only possible when the is cooperative. Relay cooperation can be achieved either

6 .4.35 T+ (a=4,b=3) T only (a=4,b=3) T+ (a=4,b=4) T only (a=4,b=3).4.35 T+ (a=4,b=3) T only (a=4,b=3) upper bound when P = Distance d T power Fig. 3. Ratio of the total number of users served under total flow rate conservation as a function of distance d. Here P = 5, P = 5, W B = W A =, W BA = 3, R B = R A =, ρ B = ρ A =. Fig. 6. Ratio of the total number of users served under individual flow conservation as a function of P P. Here, = 5, W N B = W A =, R B = R A =, ρ B = ρ A =, d = upper bound when P =5 T+ (a=4,b=3) T only (a=4,b=3) T power Fig. 4. Ratio of the total number of users served under total flow rate conservation as a function of P. Here P = 5, W N B = W A =, W BA = 3, R B = R A =, ρ B = ρ A =, d = T+ (a=4,b=3) T only (a=4,b=3) data3 (a=4,b=4) data4 (a=4,b=4) when the T owns the or when the T and have an agreement on usage of resources, for example, through a bargaining process. Bargaining between two non-cooperative agents, such as the T and the, is an interesting topic for future work. REFERENCES [] R. Pabst et al, Relay-Based Deployment Concepts for Wireless and Mobile Broadband Radio, IEEE Commun. Mag., vol. 4, pp. 8-89, Sept. 4. [] Z. Dawy, S. Davidovič, and I. Oikonomidis, Coverage and Capacity Enhancement of CDMA Cellular System via Multihop Transmission, Proc. IEEE GLOBECOM 3, pp. 47-5, Dec. 3. [3] S. Mukherjee and H. Viswanathan, Resource Allocation Strategies for Linear Symmetric Wireless Networks with Relays, Proc. IEEE ICC, pp , April. [4] E. Yanmaz and O. K. Tonguz, Dynamic Load Balancing and Sharing Performance of Integrated Wireless Networks, IEEE J. Select. Areas Commun., vol., pp , June 4. [5] H. Wu, C. Qiao, S. De, and O. K. Tonguz, Integrated Cellular and Ad-Hoc Relay Systems: icar, IEEE J. Select. Areas Commun.,vol. 9, pp. 5-5, Oct.. [6] H. Wei and R. D. Gitlin, WWAN/WLAN Two-hop-relay Architecture for Capacity Enhancement, Proc. IEEE WCNC 4, vol., pp. 5-3, March 4. [7] J. Bae, R. Berry, and M. L. Honig, Power Allocation, Rate, and Coverage for Relay-Assisted Downlink Data Transmission, Proc. IEEE ICC 6, June. 6, to appear. [8] P8.6j: PAR developed by 8.6 s Working Group Study Group on Mobile Multihop Relay, 6.pdf, Jan. 6. [9] Wireless World Initiative New Radio (WINNER), see, e.g., [] C. Zhou, P. Zhang, M. L. Honig, and S. Jordan, Two-Cell Power Allocation for Downlink CDMA, IEEE Transactions on Wireless Communications, vol. 3, no. 6, pp , Nov Distance d Fig. 5. Ratio of the total number of users served under individual flow conservation as a function of distance d. Here P = 5, P = 5, W B = W A =, R B = R A =, ρ B = ρ A =.

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science

More information

Communication Games on the Generalized Gaussian Relay Channel

Communication Games on the Generalized Gaussian Relay Channel Communication Games on the Generalized Gaussian Relay Channel Dileep M. alathil Department of Electrical Engineering University of Southern California manisser@usc.edu Rahul Jain EE & ISE Departments University

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

On Capacity Under Received-Signal Constraints

On Capacity Under Received-Signal Constraints On Capacity Under Received-Signal Constraints Michael Gastpar Dept. of EECS, University of California, Berkeley, CA 9470-770 gastpar@berkeley.edu Abstract In a world where different systems have to share

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Gaussian Relay Channel Capacity to Within a Fixed Number of Bits

Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Woohyuk Chang, Sae-Young Chung, and Yong H. Lee arxiv:.565v [cs.it] 23 Nov 2 Abstract In this paper, we show that the capacity of the threenode

More information

Vector Channel Capacity with Quantized Feedback

Vector Channel Capacity with Quantized Feedback Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,

More information

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS 1 AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS Shensheng Tang, Brian L. Mark, and Alexe E. Leu Dept. of Electrical and Computer Engineering George Mason University Abstract We apply a

More information

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems by Ali Ramezani-Kebrya A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Cell Switch Off Technique Combined with Coordinated Multi-Point (CoMP) Transmission for Energy Efficiency in Beyond-LTE Cellular Networks

Cell Switch Off Technique Combined with Coordinated Multi-Point (CoMP) Transmission for Energy Efficiency in Beyond-LTE Cellular Networks Cell Switch Off Technique Combined with Coordinated Multi-Point (CoMP) Transmission for Energy Efficiency in Beyond-LTE Cellular Networks Gencer Cili, Halim Yanikomeroglu, and F. Richard Yu Department

More information

THE dramatically increased mobile traffic can easily lead

THE dramatically increased mobile traffic can easily lead IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 12, DECEMBER 2016 3127 Dynamic Base Station Operation in Large-Scale Green Cellular Networks Yue Ling Che, Member, IEEE, Lingjie Duan, Member,

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

Binary Transmissions over Additive Gaussian Noise: A Closed-Form Expression for the Channel Capacity 1

Binary Transmissions over Additive Gaussian Noise: A Closed-Form Expression for the Channel Capacity 1 5 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 5 inary Transmissions over Additive Gaussian Noise: A Closed-Form Expression for the Channel Capacity Ahmed O.

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Interference Channel aided by an Infrastructure Relay

Interference Channel aided by an Infrastructure Relay Interference Channel aided by an Infrastructure Relay Onur Sahin, Osvaldo Simeone, and Elza Erkip *Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, Department

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

An Uplink-Downlink Duality for Cloud Radio Access Network

An Uplink-Downlink Duality for Cloud Radio Access Network An Uplin-Downlin Duality for Cloud Radio Access Networ Liang Liu, Prati Patil, and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, ON, 5S 3G4, Canada Emails: lianguotliu@utorontoca,

More information

Space Frequency Coordination Group

Space Frequency Coordination Group Space Coordination Group THE SFCG Recommendation SFCG 32-2R1 COMMUNICATION FREQUENCY ALLOCATIONS AND SHARING IN THE LUNAR REGION CONSIDERING a. that a regional communication network at the Moon can be

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

Comparison of Various Scheduling Techniques in OBS Networks

Comparison of Various Scheduling Techniques in OBS Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 2 (2012), pp. 143-149 International Research Publication House http://www.irphouse.com Comparison of

More information

On Network Interference Management

On Network Interference Management On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

End-to-End and Mac-Layer Fair Rate Assignment in Interference Limited Wireless Access Networks

End-to-End and Mac-Layer Fair Rate Assignment in Interference Limited Wireless Access Networks End-to-End and Mac-Layer Fair Rate Assignment in Interference Limited Wireless Access Networks Mustafa Arisoylu, Tara Javidi and Rene L. Cruz University of California San Diego Electrical and Computer

More information

Statistical Modeling of Co-Channel Interference

Statistical Modeling of Co-Channel Interference Statistical Modeling of Co-Channel Interference Kapil Gulati, Aditya Chopra, Brian L. Evans and Keith R. Tinsley The University of Texas at Austin, Austin, Texas 7871 Email: gulati,chopra,bevans}@ece.utexas.edu

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2 Submitted to IEEE Trans. Inform. Theory, Special Issue on Models, Theory and odes for elaying and ooperation in ommunication Networs, Aug. 2006, revised Jan. 2007 esource Allocation for Wireless Fading

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Ayfer Özgür, Olivier Lévêque Faculté Informatique et Communications Ecole Polytechnique Fédérale de Lausanne 05 Lausanne, Switzerland

More information

Optimal Link Adaptation in Wideband CDMA Systems

Optimal Link Adaptation in Wideband CDMA Systems Optimal Link Adaptation in Wideband CDMA Systems Tim Holliday, Andrea Goldsmith, and Peter Glynn Stanford University Abstract We develop a general framework for optimizing link adaptation for multiuser

More information

Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations

Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations Craig Wang, Salman Durrani, Jing Guo and Xiangyun (Sean) Zhou Research School of Engineering, The Australian National

More information

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast

More information

Analysis of Urban Millimeter Wave Microcellular Networks

Analysis of Urban Millimeter Wave Microcellular Networks Analysis of Urban Millimeter Wave Microcellular Networks Yuyang Wang, KiranVenugopal, Andreas F. Molisch, and Robert W. Heath Jr. The University of Texas at Austin University of Southern California TheUT

More information

Joint Multi-Cell Processing for Downlink Channels with Limited-Capacity Backhaul

Joint Multi-Cell Processing for Downlink Channels with Limited-Capacity Backhaul Joint Multi-Cell Processing for Downlink Channels with Limited-Capacity Backhaul Shlomo Shamai (Shitz) Department of Electrical Engineering Technion Haifa, 3000, Israel sshlomo@ee.technion.ac.il Osvaldo

More information

Approximate capacity region of the two-pair bidirectional Gaussian relay network

Approximate capacity region of the two-pair bidirectional Gaussian relay network Approximate capacity region of the two-pair bidirectional Gaussian relay network Aydin Sezgin UC Irvine CA USA asezgin@uci.edu M. Amin Khajehnejad Caltech Pasadena CA USA amin@caltech.edu A. Salman Avestimehr

More information

A Comparison of Two Achievable Rate Regions for the Interference Channel

A Comparison of Two Achievable Rate Regions for the Interference Channel A Comparison of Two Achievable Rate Regions for the Interference Channel Hon-Fah Chong, Mehul Motani, and Hari Krishna Garg Electrical & Computer Engineering National University of Singapore Email: {g030596,motani,eleghk}@nus.edu.sg

More information

How long before I regain my signal?

How long before I regain my signal? How long before I regain my signal? Tingting Lu, Pei Liu and Shivendra S. Panwar Polytechnic School of Engineering New York University Brooklyn, New York Email: tl984@nyu.edu, peiliu@gmail.com, panwar@catt.poly.edu

More information

Outline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2

Outline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2 2007 Radio and Wireless Symposium 9 11 January 2007, Long Beach, CA. Lifetime-Aware Hierarchical Wireless Sensor Network Architecture with Mobile Overlays Maryam Soltan, Morteza Maleki, and Massoud Pedram

More information

On Power Minimization for Non-orthogonal Multiple Access (NOMA)

On Power Minimization for Non-orthogonal Multiple Access (NOMA) On Power Minimization for Non-orthogonal Multiple Access (NOMA) Lei Lei, Di Yuan and Peter Värbrand Journal Article N.B.: When citing this work, cite the original article. 2016 IEEE. Personal use of this

More information

Upper bound on the ergodic rate density of ALOHA wireless ad-hoc networks

Upper bound on the ergodic rate density of ALOHA wireless ad-hoc networks Upper bound on the ergodic rate density of ALOHA wireless ad-hoc networks 1 Yaniv George, Itsik Bergel, Senior Member, IEEE, Ephraim Zehavi, Fellow, IEEE Abstract We present a novel upper bound on the

More information

Optimal matching in wireless sensor networks

Optimal matching in wireless sensor networks Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network

More information

Node-Based Distributed Optimal Control of Wireless Networks

Node-Based Distributed Optimal Control of Wireless Networks Node-Based Distributed Optimal Control of Wireless Networks Yufang Xi and Edmund M. Yeh Department of Electrical Engineering Yale University New Haven CT 06520 USA Email: {yufang.xi edmund.yeh}@yale.edu

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of

More information

The Impact of Fading and Interference Cancelation On Node Density Outage Probability Tradeoff in Wireless Networks

The Impact of Fading and Interference Cancelation On Node Density Outage Probability Tradeoff in Wireless Networks The Impact of Fading and Interference Cancelation On Node Density Outage Probability Tradeoff in Wireless Networks Vladimir Mordachev Electromagnetic Compatibility Laboratory Belorussian State University

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers

Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers Wenjun Li and Huaiyu Dai Department of Electrical and Computer Engineering North Carolina State University Raleigh,

More information

Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure

Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure Abdulla A. Hammad, Terence D. Todd, George Karakostas and Dongmei Zhao Department of Electrical and Computer Engineering McMaster

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

Optimization in Wireless Communication

Optimization in Wireless Communication Zhi-Quan (Tom) Luo Department of Electrical and Computer Engineering University of Minnesota 200 Union Street SE Minneapolis, MN 55455 2007 NSF Workshop Challenges Optimization problems from wireless applications

More information

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference

More information

Network Control: A Rate-Distortion Perspective

Network Control: A Rate-Distortion Perspective Network Control: A Rate-Distortion Perspective Jubin Jose and Sriram Vishwanath Dept. of Electrical and Computer Engineering The University of Texas at Austin {jubin, sriram}@austin.utexas.edu arxiv:8.44v2

More information

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks This paper was presented as part of the Mini-Conference at IEEE INFOCOM 11 On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks Lei Sun Wenye Wang

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

A Fluid Model for Performance Analysis in Cellular Networks

A Fluid Model for Performance Analysis in Cellular Networks A Fluid Model for Performance Analysis in Cellular Networks Jean-Marc Kelif a,, a France Telecom R&D, Issy-Les-Moulineaux, France Marceau Coupechoux b, Philippe Godlewski b b TELECOM ParisTech & CNRS LTCI

More information

Random Access Protocols for Massive MIMO

Random Access Protocols for Massive MIMO Random Access Protocols for Massive MIMO Elisabeth de Carvalho Jesper H. Sørensen Petar Popovski Aalborg University Denmark Emil Björnson Erik G. Larsson Linköping University Sweden 2016 Tyrrhenian International

More information

A Two-Phase Power Allocation Scheme for CRNs Employing NOMA

A Two-Phase Power Allocation Scheme for CRNs Employing NOMA A Two-Phase Power Allocation Scheme for CRNs Employing NOMA Ming Zeng, Georgios I. Tsiropoulos, Animesh Yadav, Octavia A. Dobre, and Mohamed H. Ahmed Faculty of Engineering and Applied Science, Memorial

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary. Spatial Correlation

Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary. Spatial Correlation Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary Spatial Correlation Ahmed K Sadek, Weifeng Su, and K J Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

Short-Packet Communications in Non-Orthogonal Multiple Access Systems

Short-Packet Communications in Non-Orthogonal Multiple Access Systems Short-Packet Communications in Non-Orthogonal Multiple Access Systems Xiaofang Sun, Shihao Yan, Nan Yang, Zhiguo Ding, Chao Shen, and Zhangdui Zhong State Key Lab of Rail Traffic Control and Safety, Beijing

More information

On the Power Allocation for Hybrid DF and CF Protocol with Auxiliary Parameter in Fading Relay Channels

On the Power Allocation for Hybrid DF and CF Protocol with Auxiliary Parameter in Fading Relay Channels On the Power Allocation for Hybrid DF and CF Protocol with Auxiliary Parameter in Fading Relay Channels arxiv:4764v [csit] 4 Dec 4 Zhengchuan Chen, Pingyi Fan, Dapeng Wu and Liquan Shen Tsinghua National

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel and Ashutosh Sabharwal 1 Abstract arxiv:1104.4805v3 [cs.it]

More information

Relay Selection for MIMO and Massive MIMO Two-Way Relay Networks. Jayamuni Mario Shashindra S. Silva

Relay Selection for MIMO and Massive MIMO Two-Way Relay Networks. Jayamuni Mario Shashindra S. Silva Relay Selection for MIMO and Massive MIMO Two-Way Relay Networks by Jayamuni Mario Shashindra S. Silva A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

Machine-Type Communication with Random Access and Data Aggregation: A Stochastic Geometry Approach

Machine-Type Communication with Random Access and Data Aggregation: A Stochastic Geometry Approach Machine-Type Communication with Random Access and Data Aggregation: A Stochastic Geometry Approach Jing Guo, Salman Durrani, Xiangyun Zhou, and Halim Yanikomeroglu Research School of Engineering, The Australian

More information

Coded Caching for Multi-level Popularity and Access

Coded Caching for Multi-level Popularity and Access Coded Caching for Multi-level Popularity and Access Jad Hachem, Student Member, IEEE, Nikhil Karamchandani, Member, IEEE, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:4046563v2 [csit] 3 Dec 205 To address

More information

Electrical Engineering Written PhD Qualifier Exam Spring 2014

Electrical Engineering Written PhD Qualifier Exam Spring 2014 Electrical Engineering Written PhD Qualifier Exam Spring 2014 Friday, February 7 th 2014 Please do not write your name on this page or any other page you submit with your work. Instead use the student

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Kaya Tutuncuoglu and Aylin Yener Department of Electrical Engineering The Pennsylvania State University, University Park, PA

More information

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, ACCEPTED AND TO APPEAR IN 05 Optimal Power Allocation With Statistical QoS Provisioning for DD and Cellular Communications Over Underlaying Wireless Networks

More information

Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah

Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah Security Level: Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah www.huawei.com Mathematical and Algorithmic Sciences Lab HUAWEI TECHNOLOGIES CO., LTD. Before 2010 Random Matrices and MIMO

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information