WorldWideScience

Sample records for wireless multi-hop relay

  1. On Multi-Hop Decode-and-Forward Cooperative Relaying for Industrial Wireless Sensor Networks.

    Science.gov (United States)

    Ai, Yun; Cheffena, Michael

    2017-03-28

    Wireless sensor networks (WSNs) will play a fundamental role in the realization of Internet of Things and Industry 4.0. Arising from the presence of spatially distributed sensor nodes in a sensor network, cooperative diversity can be achieved by using the sensor nodes between a given source-destination pair as intermediate relay stations. In this paper, we investigate the end-to-end average bit error rate (BER) and the channel capacity of a multi-hop relay network in the presence of impulsive noise modeled by the well-known Middleton's class-A model. Specifically, we consider a multi-hop decode-and-forward (DF) relay network over Nakagami-m fading channel due to its generality, but also due to the absence of reported works in this area. Closed-form analytical expressions for the end-to-end average BER and the statistical properties of the end-to-end channel capacity are obtained. The impacts of the channel parameters on these performance quantities are evaluated and discussed.

  2. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  3. Interference-based routing in multi-hop wireless infrastructures

    NARCIS (Netherlands)

    Heijenk, Geert; Liu, F.; Braun, Torsten; Carle, Georg; Koucheryavy, Yevgeni; Tsaoussidis, Vassilis

    In this paper, multi-hop wireless infrastructures are identified as a way to increase user data rates and/or capacity of wireless systems by means of a high base station density without high base station interconnection costs. For such a system, a new routing algorithm, named Balanced Interference

  4. Interference-based routing in multi-hop wireless infrastructures

    NARCIS (Netherlands)

    Heijenk, Geert; Liu, F.; Braun, T.; Carle, G.; Koucheryavy, Y.; Tsaoussidis, V.

    In this paper, multi-hop wireless infrastructures are identified as a way to increase user data rates and/or capacity of wireless systems by means of a high base station density without high base station interconnection costs. For such a system, a new routing algorithm, named balanced interference

  5. Multi-hop Relaying: An End-to-End Delay Analysis

    KAUST Repository

    Chaaban, Anas

    2015-12-01

    The impact of multi-hopping schemes on the communication latency in a relay channel is studied. The main aim is to characterize conditions under which such schemes decrease the communication latency given a reliability requirement. Both decode-forward (DF) and amplify-forward (AF) with block coding are considered, and are compared with the point-to-point (P2P) scheme which ignores the relay. Latency expressions for the three schemes are derived, and conditions under which DF and AF reduce latency are obtained for high signal-to-noise ratio (SNR). Interestingly, these conditions are more strict when compared to the conditions under which the same multi-hopping schemes achieve higher long-term (information-theoretic) rates than P2P. It turns out that the relation between the sourcedestination SNR and the harmonic mean of the SNR’s of the channels to and from the relay dictates whether multi-hopping reduces latency or not.

  6. Link and route availability for Inter-working multi-hop wireless networks

    CSIR Research Space (South Africa)

    Salami, O

    2009-09-01

    Full Text Available In inter-working multi-hop wireless networks, establishing resilient connectivity between source-destination node pairs is a major issue. The issue of connectivity in multi-hop wireless networks have been studied. However, these analyses focused...

  7. Connectivity model for Inter-working multi-hop wireless networks

    CSIR Research Space (South Africa)

    Salami, O

    2009-08-01

    Full Text Available In Inter-working multi-hop wireless networks, establishing resilient connectivity between source-destination node pairs is a major issue. The issues of connectivity in Multi-hop wireless networks have been studied. However, these analyses focused...

  8. Directional Relays for Multi-Hop Cooperative Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    N. Nouri

    2013-09-01

    Full Text Available In this paper, we investigate power allocation and beamforming in a relay assisted cognitive radio (CR network. Our objective is to maximize the performance of the CR network while limiting interference in the direction of the primary users (PUs. In order to achieve these goals, we first consider joint power allocation and beamforming for cognitive nodes in direct links. Then, we propose an optimal power allocation strategy for relay nodes in indirect transmissions. Unlike the conventional cooperative relaying networks, the applied relays are equipped with directional antennas to further reduce the interference to PUs and meet the CR network requirements. The proposed approach employs genetic algorithm (GA to solve the optimization problems. Numerical simulation results illustrate the quality of service (QoS satisfaction in both primary and secondary networks. These results also show that notable improvements are achieved in the system performance if the conventional omni-directional relays are replaced with directional ones.

  9. Power and delay optimisation in multi-hop wireless networks

    KAUST Repository

    Xia, Li

    2014-02-05

    In this paper, we study the optimisation problem of transmission power and delay in a multi-hop wireless network consisting of multiple nodes. The goal is to determine the optimal policy of transmission rates at various buffer and channel states in order to minimise the power consumption and the queueing delay of the whole network. With the assumptions of interference-free links and independently and identically distributed (i.i.d.) channel states, we formulate this problem using a semi-open Jackson network model for data transmission and a Markov model for channel states transition. We derive a difference equation of the system performance under any two different policies. The necessary and sufficient condition of optimal policy is obtained. We also prove that the system performance is monotonic with respect to (w.r.t.) the transmission rate and the optimal transmission rate can be either maximal or minimal. That is, the ‘bang-bang’ control is an optimal control. This optimality structure greatly reduces the problem complexity. Furthermore, we develop an iterative algorithm to find the optimal solution. Finally, we conduct the simulation experiments to demonstrate the effectiveness of our approach. We hope our work can shed some insights on solving this complicated optimisation problem.

  10. Power and delay optimisation in multi-hop wireless networks

    Science.gov (United States)

    Xia, Li; Shihada, Basem

    2014-06-01

    In this paper, we study the optimisation problem of transmission power and delay in a multi-hop wireless network consisting of multiple nodes. The goal is to determine the optimal policy of transmission rates at various buffer and channel states in order to minimise the power consumption and the queueing delay of the whole network. With the assumptions of interference-free links and independently and identically distributed (i.i.d.) channel states, we formulate this problem using a semi-open Jackson network model for data transmission and a Markov model for channel states transition. We derive a difference equation of the system performance under any two different policies. The necessary and sufficient condition of optimal policy is obtained. We also prove that the system performance is monotonic with respect to (w.r.t.) the transmission rate and the optimal transmission rate can be either maximal or minimal. That is, the 'bang-bang' control is an optimal control. This optimality structure greatly reduces the problem complexity. Furthermore, we develop an iterative algorithm to find the optimal solution. Finally, we conduct the simulation experiments to demonstrate the effectiveness of our approach. We hope our work can shed some insights on solving this complicated optimisation problem.

  11. Design of zone-based bandwidth management scheme in IEEE 802.16 multi-hop relay networks

    Directory of Open Access Journals (Sweden)

    Chen Kuo-Yang

    2011-01-01

    Full Text Available Abstract IEEE 802.16 Wireless Network technology is a hot research issue in recent years. It provides wider coverage of radio and higher speed wireless access, and Quality-of-Service plays an important part in the standard. For mobile multi-hop wireless network, IEEE 802.16j/MR network not only can supply large area wireless deployment, but also can provide high quality network service to mobile users. Although Mobile QoS supporting has been extensively investigated, Mobile QoS supporting in the IEEE 802.16-MR network is relatively unexplored. In this article, the probability of a mobile user who visits a Relay Station (RS is known beforehand. With the visiting probability at each RS and the system specified size of the range for bandwidth allocation, Base Station (BS can calculate the required bandwidth to meet the mobile user's demand and allocate appropriate bandwidth for a mobile user roaming in the range of the bandwidth allocation. The range of bandwidth allocation for mobile users is called the Zone in this article, which includes the user's current RS and the nearby RSs. The proposed scheme is therefore called Zone-based bandwidth management scheme. The simulation results demonstrate that Zone-based bandwidth management scheme can reduce QoS degradation and bandwidth re-allocation overhead.

  12. Analysis of route availability in inter-working multi-hop wireless networks

    CSIR Research Space (South Africa)

    Salami, O

    2009-07-01

    Full Text Available In order to link a source-destination node pair in inter-working multi-hop wireless networks, links or routes must first be available. It is only after establishing the availability of links and routes between nodes that factors which affect...

  13. Multi-hop localization algorithm based on grid-scanning for wireless sensor networks.

    Science.gov (United States)

    Wan, Jiangwen; Guo, Xiaolei; Yu, Ning; Wu, Yinfeng; Feng, Renjian

    2011-01-01

    For large-scale wireless sensor networks (WSNs) with a minority of anchor nodes, multi-hop localization is a popular scheme for determining the geographical positions of the normal nodes. However, in practice existing multi-hop localization methods suffer from various kinds of problems, such as poor adaptability to irregular topology, high computational complexity, low positioning accuracy, etc. To address these issues in this paper, we propose a novel Multi-hop Localization algorithm based on Grid-Scanning (MLGS). First, the factors that influence the multi-hop distance estimation are studied and a more realistic multi-hop localization model is constructed. Then, the feasible regions of the normal nodes are determined according to the intersection of bounding square rings. Finally, a verifiably good approximation scheme based on grid-scanning is developed to estimate the coordinates of the normal nodes. Additionally, the positioning accuracy of the normal nodes can be improved through neighbors' collaboration. Extensive simulations are performed in isotropic and anisotropic networks. The comparisons with some typical algorithms of node localization confirm the effectiveness and efficiency of our algorithm.

  14. Multi-hop amplify-and-forward relaying cooperation in the presence of I/Q imbalance

    KAUST Repository

    Qi, Jian

    2013-06-01

    In this paper, multi-hop cooperative networks implementing channel state information (CSI)-assisted amplify-and-forward (AF) relaying in the presence of in-phase and quadrature-phase (I/Q) imbalance are investigated. We propose a compensation algorithm for the I/Q imbalance. The performance of the multi-hop CSI-assisted AF cooperative networks with and without compensation for I/Q imbalance in Nakagami-m fading environment is evaluated in terms of average symbol error probability. Numerical results are provided and show that the proposed compensation method can effectively mitigate the impact of I/Q imbalance. © 2013 IEEE.

  15. Energy-aware Wireless Multi-hop Networks

    OpenAIRE

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in processing capabilities of electronic devices coupled with advances in wireless communication have resulted in the emergence of devices which have high processing and communication capabilities. Small de...

  16. Dynamic Task Allocation in Multi-Hop Multimedia Wireless Sensor Networks with Low Mobility

    Directory of Open Access Journals (Sweden)

    Klaus Moessner

    2013-10-01

    Full Text Available This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines.

  17. Energy-aware Wireless Multi-hop Networks

    NARCIS (Netherlands)

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in

  18. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    Science.gov (United States)

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  19. LTE-A cellular networks multi-hop relay for coverage, capacity and performance enhancement

    CERN Document Server

    Yahya, Abid

    2017-01-01

    In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications. Provides a variety of methods for enhancing capacity and coverage in LTE-A cellular networks Develop...

  20. Group Centric Networking: A New Approach for Wireless Multi-Hop Networking to Enable the Internet of Things

    Science.gov (United States)

    2016-01-22

    connectivity and reli- ability. 1. INTRODUCTION Despite decades of e↵ort, multi-hop wireless networks have not succeeded in fulfilling their once...nary 5G standards organizations have already begun putting forth ideas for designing future wireless systems, This work is sponsored by Defense...P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka et al., “Scenarios for 5g mobile and wireless communications: the vision of

  1. TCP adaptation with network coding and opportunistic data forwarding in multi-hop wireless networks

    Directory of Open Access Journals (Sweden)

    Chen Zhang

    2016-10-01

    Full Text Available Opportunistic data forwarding significantly increases the throughput in multi-hop wireless mesh networks by utilizing the broadcast nature of wireless transmissions and the fluctuation of link qualities. Network coding strengthens the robustness of data transmissions over unreliable wireless links. However, opportunistic data forwarding and network coding are rarely incorporated with TCP because the frequent occurrences of out-of-order packets in opportunistic data forwarding and long decoding delay in network coding overthrow TCP’s congestion control. In this paper, we propose a solution dubbed TCPFender, which supports opportunistic data forwarding and network coding in TCP. Our solution adds an adaptation layer to mask the packet loss caused by wireless link errors and provides early positive feedbacks to trigger a larger congestion window for TCP. This adaptation layer functions over the network layer and reduces the delay of ACKs for each coded packet. The simulation results show that TCPFender significantly outperforms TCP/IP in terms of the network throughput in different topologies of wireless networks.

  2. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2016-10-17

    In this paper, we consider a transmit power allocation problem for secure transmission in multi-hop decode-and-forward (DF) full-duplex relay (FDR) networks, where multiple FDRs are located at each hop and perform cooperative beamforming to null out the signal at multiple eavesdroppers. For a perfect self-interference cancellation (PSIC) case, where the self-interference signal at each FDR is completely canceled, we derive an optimal power allocation (OPA) strategy using the Karush-Kuhn-Tucker (KKT) conditions to maximize the achievable secrecy rate under an overall transmit power constraint. In the case where residual self-interferences exist owing to imperfect self-interference cancellation (ISIC), we also propose a transmit power allocation scheme using the geometric programming (GP) method. Numerical results are presented to verify the secrecy rate performance of the proposed power allocation schemes.

  3. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2016-10-01

    Full Text Available In this paper, we consider a transmit power allocation problem for secure transmission in multi-hop decode-and-forward (DF full-duplex relay (FDR networks, where multiple FDRs are located at each hop and perform cooperative beamforming to null out the signal at multiple eavesdroppers. For a perfect self-interference cancellation (PSIC case, where the self-interference signal at each FDR is completely canceled, we derive an optimal power allocation (OPA strategy using the Karush-Kuhn-Tucker (KKT conditions to maximize the achievable secrecy rate under an overall transmit power constraint. In the case where residual self-interferences exist owing to imperfect self-interference cancellation (ISIC, we also propose a transmit power allocation scheme using the geometric programming (GP method. Numerical results are presented to verify the secrecy rate performance of the proposed power allocation schemes.

  4. A Routing Strategy for Non-Cooperation Wireless Multi-Hop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dung T. Tran

    2012-01-01

    Full Text Available Choosing routes such that the network lifetime is maximized in a wireless network with limited energy resources is a major routing problem in wireless multi-hop ad hoc networks. In this paper, we study the problem where participants are rationally selfish and non-cooperative. By selfish we designate the users who are ready to tamper with their source-routing (senders could choose intermediate nodes in the routing paths or next hop selection strategies in order to increase the total number of packets transmitted, but do not try to harm or drop packets of the other nodes. The problem therefore amounts to a non-cooperative game. In the works [2,6,19,23], the authors show that the game admits Nash equilibria [1]. Along this line, we first show that if the cost function is linear, this game has pure-strategy equilibrium flow even though participants have different demands. However, finding a Nash equilibrium for a normal game is computationally hard [9]. In this work, inspired by mixed-strategy equilibrium, we propose a simple local routing algorithm called MIxed Path Routing protocol (MiPR. Using analysis and simulations, we show that MiPR drives the system to an equilibrium state where selfish participants do not have incentive to deviate. Moreover, MiPR significantly improves the network lifetime as compared to original routing protocols.

  5. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  6. A Multi-Hop Energy Neutral Clustering Algorithm for Maximizing Network Information Gathering in Energy Harvesting Wireless Sensor Networks

    OpenAIRE

    Yang, Liu; Lu, Yinzhi; Zhong, Yuanchang; Wu, Xuegang; Yang, Simon X.

    2015-01-01

    Energy resource limitation is a severe problem in traditional wireless sensor networks (WSNs) because it restricts the lifetime of network. Recently, the emergence of energy harvesting techniques has brought with them the expectation to overcome this problem. In particular, it is possible for a sensor node with energy harvesting abilities to work perpetually in an Energy Neutral state. In this paper, a Multi-hop Energy Neutral Clustering (MENC) algorithm is proposed to construct the optimal m...

  7. Risk-aware scheduling for multi-user video streaming over wireless multi-hop networks

    Science.gov (United States)

    Shiang, Hsien-Po; van der Schaar, Mihaela

    2008-01-01

    To cope with the time-varying network conditions, various error-protection and channel adaptation strategies have been proposed at different layers of the protocol stack. However, these cross-layer strategies can be efficiently optimized only if they act on accurate information about the network conditions and hence, are able to timely adapt to network changes. We analyze the impact of such information feedback on the video quality performances of the collaborative multimedia users sharing the same multi-hop wireless infrastructure. Based on the information feedback, we can estimate the risk that packets from different priority and deadline classes will not arrive at their destination before their decoding deadline. Subsequently, cross-layer optimization strategies such as packet scheduling, retransmission (due to transmission error) limit are adapted to jointly consider the estimated risk as well as the impact in terms of distortion of not receiving different priority packets. Our results quantify the risk estimation and its benefit in different network conditions and for various video applications with different delay constraints.

  8. Neighbor discovery in multi-hop wireless networks: evaluation and dimensioning with interferences considerations

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2008-04-01

    Full Text Available In this paper, we study the impact of collisions and interferences on a neighbor discovery process in the context of multi-hop wireless networks. We consider three models in which interferences and collisions are handled in very different ways. From an ideal channel where simultaneous transmissions do not interfere, we derive an alternate channel where simultaneous transmissions are considered two-by-two under the form of collisions, to finally reach a more realistic channel where simultaneous transmissions are handled under the form of shot-noise interferences. In these models, we analytically compute the link probability success between two neighbors as well as the expected number of nodes that correctly receive a Hello packet. Using this analysis, we show that if the neighbor discovery process is asymptotically equivalent in the three models, it offers very different behaviors locally in time. In particular, the scalability of the process is not the same depending on the way interferences are handled. Finally, we apply our results to the dimensioning of a Hello protocol parameters. We propose a method to adapt the protocol parameters to meet application constraints on the neighbor discovery process and to minimize the protocol energy consumption.

  9. A Multi-hop Topology Control Based on Inter-node Range Measurement for Wireless Sensor Networks Node Localization

    Directory of Open Access Journals (Sweden)

    Ali Husein ALASIRY

    2011-10-01

    Full Text Available In centralized range-based localization techniques, sufficiency of inter-node range information received by the base station strongly affects node position estimation results. Successful data aggregation is influenced by link stability of each connection of routes, especially in a multi-hop topology model. In general, measuring the inter-node range is only performed for position determination purposes. This research introduces the use of inter-node range measurement information for link selection in a multi-hop route composition in order to increase the rate of data aggregation. Due to irregularity problems of wireless media, two areas of node communication have been considered. The regular communication area is the area in which other nodes are able to perform symmetrical communication to the node without failure. The irregular area is the area in which other nodes are seldom able to communicate. Due to its instability, some existing methods tried to avoid the irregular area completely. The proposed method, named Virtual Boundaries (VBs prioritizes these areas. The regular communication area’s nodes have high priority to be selected as link vertices; however, when there is no link candidate inside this area, nodes within the irregular area will be selected with respect to their range to the parent node. This technique resulted in a more robust multi-hop topology that can reduce isolated node numbers and increase the percentage of data collected by the base station accordingly.

  10. A Multi-Hop Energy Neutral Clustering Algorithm for Maximizing Network Information Gathering in Energy Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Yang, Liu; Lu, Yinzhi; Zhong, Yuanchang; Wu, Xuegang; Yang, Simon X

    2015-12-26

    Energy resource limitation is a severe problem in traditional wireless sensor networks (WSNs) because it restricts the lifetime of network. Recently, the emergence of energy harvesting techniques has brought with them the expectation to overcome this problem. In particular, it is possible for a sensor node with energy harvesting abilities to work perpetually in an Energy Neutral state. In this paper, a Multi-hop Energy Neutral Clustering (MENC) algorithm is proposed to construct the optimal multi-hop clustering architecture in energy harvesting WSNs, with the goal of achieving perpetual network operation. All cluster heads (CHs) in the network act as routers to transmit data to base station (BS) cooperatively by a multi-hop communication method. In addition, by analyzing the energy consumption of intra- and inter-cluster data transmission, we give the energy neutrality constraints. Under these constraints, every sensor node can work in an energy neutral state, which in turn provides perpetual network operation. Furthermore, the minimum network data transmission cycle is mathematically derived using convex optimization techniques while the network information gathering is maximal. Simulation results show that our protocol can achieve perpetual network operation, so that the consistent data delivery is guaranteed. In addition, substantial improvements on the performance of network throughput are also achieved as compared to the famous traditional clustering protocol LEACH and recent energy harvesting aware clustering protocols.

  11. A Multi-Hop Energy Neutral Clustering Algorithm for Maximizing Network Information Gathering in Energy Harvesting Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2015-12-01

    Full Text Available Energy resource limitation is a severe problem in traditional wireless sensor networks (WSNs because it restricts the lifetime of network. Recently, the emergence of energy harvesting techniques has brought with them the expectation to overcome this problem. In particular, it is possible for a sensor node with energy harvesting abilities to work perpetually in an Energy Neutral state. In this paper, a Multi-hop Energy Neutral Clustering (MENC algorithm is proposed to construct the optimal multi-hop clustering architecture in energy harvesting WSNs, with the goal of achieving perpetual network operation. All cluster heads (CHs in the network act as routers to transmit data to base station (BS cooperatively by a multi-hop communication method. In addition, by analyzing the energy consumption of intra- and inter-cluster data transmission, we give the energy neutrality constraints. Under these constraints, every sensor node can work in an energy neutral state, which in turn provides perpetual network operation. Furthermore, the minimum network data transmission cycle is mathematically derived using convex optimization techniques while the network information gathering is maximal. Simulation results show that our protocol can achieve perpetual network operation, so that the consistent data delivery is guaranteed. In addition, substantial improvements on the performance of network throughput are also achieved as compared to the famous traditional clustering protocol LEACH and recent energy harvesting aware clustering protocols.

  12. Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI

    Directory of Open Access Journals (Sweden)

    Tran Tin Phu

    2017-01-01

    Full Text Available In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays. From the eavesdropping Channel State Information (CSI estimated, the source and relays adjust their transmit power so that the eavesdropper cannot overhear the transmitted data. Moreover, to enhance throughput for the proposed system, Non-Orthogonal Multiple Access (NOMA technique with a simple power allocation is also proposed. We derive exact closed-form expressions of the Outage Probability (OP and throughput for the data transmission over Rayleigh fading channel. In addition, when the CSI estimation is imperfect, Intercept Probability (IP at the eavesdropper is derived. Finally, Monte Carlo simulations are presented to verify the theoretical derivations.

  13. Radio Relays Improve Wireless Products

    Science.gov (United States)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  14. Relaying Strategies and Protocols for Efficient Wireless Networks

    KAUST Repository

    Zafar, Ammar

    2014-10-01

    Next generation wireless networks are expected to provide high data rate and satisfy the Quality-of-Service (QoS) constraints of the users. A significant component of achieving these goals is to increase the effi ciency of wireless networks by either optimizing current architectures or exploring new technologies which achieve that. The latter includes revisiting technologies which were previously proposed, but due to a multitude of reasons were ignored at that time. One such technology is relaying which was initially proposed in the latter half of the 1960s and then was revived in the early 2000s. In this dissertation, we study relaying in conjunction with resource allocation to increase the effi ciency of wireless networks. In this regard, we differentiate between conventional relaying and relaying with buffers. Conventional relaying is traditional relaying where the relay forwards the signal it received immediately. On the other hand, in relaying with buffers or buffer-aided relaying as it is called, the relay can store received data in its buffer and forward it later on. This gives the benefit of taking advantage of good channel conditions as the relay can only transmit when the channel conditions are good. The dissertation starts with conventional relaying and considers the problem of minimizing the total consumed power while maintaining system QoS. After upper bounding the system performance, more practical algorithms which require reduced feedback overhead are explored. Buffer-aided relaying is then considered and the joint user-and-hop scheduler is introduced which exploits multi-user diversity (MUD) and 5 multi-hop diversity (MHD) gains together in dual-hop broadcast channels. Next joint user-and-hop scheduling is extended to the shared relay channel where two source-destination pairs share a single relay. The benefits of buffer-aided relaying in the bidirectional relay channel utilizing network coding are then explored. Finally, a new transmission protocol

  15. A Jackson network model and threshold policy for joint optimization of energy and delay in multi-hop wireless networks

    KAUST Repository

    Xia, Li

    2014-11-20

    This paper studies the joint optimization problem of energy and delay in a multi-hop wireless network. The optimization variables are the transmission rates, which are adjustable according to the packet queueing length in the buffer. The optimization goal is to minimize the energy consumption of energy-critical nodes and the packet transmission delay throughout the network. In this paper, we aim at understanding the well-known decentralized algorithms which are threshold based from a different research angle. By using a simplified network model, we show that we can adopt the semi-open Jackson network model and study this optimization problem in closed form. This simplified network model further allows us to establish some significant optimality properties. We prove that the system performance is monotonic with respect to (w.r.t.) the transmission rate. We also prove that the threshold-type policy is optimal, i.e., when the number of packets in the buffer is larger than a threshold, transmit with the maximal rate (power); otherwise, no transmission. With these optimality properties, we develop a heuristic algorithm to iteratively find the optimal threshold. Finally, we conduct some simulation experiments to demonstrate the main idea of this paper.

  16. Sleep/wake scheduling scheme for minimizing end-to-end delay in multi-hop wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Madani Sajjad

    2011-01-01

    Full Text Available Abstract We present a sleep/wake schedule protocol for minimizing end-to-end delay for event driven multi-hop wireless sensor networks. In contrast to generic sleep/wake scheduling schemes, our proposed algorithm performs scheduling that is dependent on traffic loads. Nodes adapt their sleep/wake schedule based on traffic loads in response to three important factors, (a the distance of the node from the sink node, (b the importance of the node's location from connectivity's perspective, and (c if the node is in the proximity where an event occurs. Using these heuristics, the proposed scheme reduces end-to-end delay and maximizes the throughput by minimizing the congestion at nodes having heavy traffic load. Simulations are carried out to evaluate the performance of the proposed protocol, by comparing its performance with S-MAC and Anycast protocols. Simulation results demonstrate that the proposed protocol has significantly reduced the end-to-end delay, as well as has improved the other QoS parameters, like average energy per packet, average delay, packet loss ratio, throughput, and coverage lifetime.

  17. Multi-hop wireless charging optimization in Low-Power Networks

    OpenAIRE

    Rault, Tifenn; Bouabdallah, Abdelmadjid; Challal, Yacine

    2013-01-01

    International audience; Recent advancements in wireless charging technology offer promising alternative to address the challenging problem of energy consumption in low-power networks. Based on these breakthroughs, existing solutions have investigated wireless charging strategies of low-power networks through the use of mobile chargers, where a charger has to come at the nodes' vicinity to recharge their battery. However, none of these works have considered the multihop energy transmission, wh...

  18. Clustering algorithm in initialization of multi-hop wireless sensor networks

    NARCIS (Netherlands)

    Guo, Peng; Tao, Jiang; Zhang, Kui; Chen, Hsiao-Hwa

    2009-01-01

    In most application scenarios of wireless sensor networks (WSN), sensor nodes are usually deployed randomly and do not have any knowledge about the network environment or even their ID's at the initial stage of their operations. In this paper, we address the clustering problems with a newly deployed

  19. Collision-free time slot reuse in multi-hop wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2005-01-01

    To ensure a long-lived network of wireless communicating sensors, we are in need of a medium access control protocol that is able to prevent energy-wasting effects like idle listening, hidden terminal problem or collision of packets. Schedule-based medium access protocols are in general robust

  20. On the Degrees of Freedom for Multi-Hop Wireless Networks under Layered TDD Constraint

    Directory of Open Access Journals (Sweden)

    Feng Liu

    2014-05-01

    Full Text Available Degrees of freedom (DoF of a network build a new scaling law characterizing the scalability of capacity at high signal-to-noise region. In this paper, we extend our recent work from cascaded network to the general K-hop layered network. The main framework is based on the assumption of layered TDD, where all nodes at each layer work with the same on/off status. By this approach we decompose the DoF analysis into two steps: 1 apply the result of cascaded networks; 2 analyze / design the transmission of each hop. The upper and lower bounds on DoF are deduced. By viewing the network as cascaded X channels, we find an inner bound of the DoF region, applicable to many message topologies. The detail of message splitting is demonstrated. Finally ultimate analysis shows if the number of antennas/nodes at each relay layer goes to infinity, the lower bound reaches the upper bound. As a by-product, when K > 2 the network can alleviate the effect of TDD with the increase of relay antennas/nodes.

  1. Multi-Hop Link Capacity of Multi-Route Multi-Hop MRC Diversity for a Virtual Cellular Network

    Science.gov (United States)

    Daou, Imane; Kudoh, Eisuke; Adachi, Fumiyuki

    In virtual cellular network (VCN), proposed for high-speed mobile communications, the signal transmitted from a mobile terminal is received by some wireless ports distributed in each virtual cell and relayed to the central port that acts as a gateway to the core network. In this paper, we apply the multi-route MHMRC diversity in order to decrease the transmit power and increase the multi-hop link capacity. The transmit power, the interference power and the link capacity are evaluated for DS-CDMA multi-hop VCN by computer simulation. The multi-route MHMRC diversity can be applied to not only DS-CDMA but also other access schemes (i. e. MC-CDMA, OFDM, etc.).

  2. Characterizing Deficiencies of Path-Based Routing for Wireless Multi-Hop Networks

    Science.gov (United States)

    2017-05-01

    Transactions on, vol. 46, no. 2, pp. 388–404, 2000. [39] S. Guo, L. He, Y. Gu, B. Jiang, and T. He, “Opportunistic flood - ing in low-duty- cycle wireless sensor...a route to another user only when it has data destined for that user. To find a route, a control packet is flooded across the network that identifies...link exists until no set of control packets are exchanged for the length of a timeout period, which is typically a cycle of 2 or 3 hello messages

  3. On the Effect of Self-Interference Cancelation in MultiHop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ephremides Anthony

    2010-01-01

    Full Text Available In a wireless network, the problem of self-interference arises when a node transmits and receives simultaneously in the same frequency band. So far only two extreme approaches to circumvent this problem were thoroughly investigated in the literature. The first one prevents any node to transmit and receive simultaneously which may lead to a too conservative design. The second one assumes perfect self-interference cancelation which can be too optimistic since it ignores all possible technological limitations. To fill this gap, we provide a method based on complementary geometric programming for evaluating the gains achievable at the network layer when the network nodes employ self-interference cancelation techniques with different degrees of accuracy. The gains are evaluated in terms of average sum rate and average network congestion by using a network utility maximization framework. The method provides insights into the behavior of different network topologies when self-interference cancellation is employed in nodes. In addition, it can be used to assess the required degrees of accuracy of the self-interference in order to achieve substantial benefits. Thus, from a network design perspective, the proposed method is very beneficial. Numerical results suggest that the benefits from self-interference cancelation are more pronounced in tandem wireless network setups in which the network nodes are located in a linear grid.

  4. Effective Data Acquisition Protocol for Multi-Hop Heterogeneous Wireless Sensor Networks Using Compressive Sensing

    Directory of Open Access Journals (Sweden)

    Ahmed M. Khedr

    2015-10-01

    Full Text Available In designing wireless sensor networks (WSNs, it is important to reduce energy dissipation and prolong network lifetime. Clustering of nodes is one of the most effective approaches for conserving energy in WSNs. Cluster formation protocols generally consider the heterogeneity of sensor nodes in terms of energy difference of nodes but ignore the different transmission ranges of them. In this paper, we propose an effective data acquisition clustered protocol using compressive sensing (EDACP-CS for heterogeneous WSNs that aims to conserve the energy of sensor nodes in the presence of energy and transmission range heterogeneity. In EDACP-CS, cluster heads are selected based on the distance from the base station and sensor residual energy. Simulation results show that our protocol offers a much better performance than the existing protocols in terms of energy consumption, stability, network lifetime, and throughput.

  5. BER analysis of multi-hop heterodyne FSO systems with fixed gain relays over general Malaga turbulence channels

    KAUST Repository

    Alheadary, Wael Ghazy

    2017-07-20

    This work investigates the end-to-end performance of a free space optical amplify-and-forward (AF) fixed-gain relaying system using heterodyne detection over misaligned general Malaga turbulence channels. More specifically, we present exact closed-form expressions for average bit-error rate achievable spectral efficiency non-adaptive/adaptive modulation schemes by employing generalized power series identity of Meijer\\'s G-function. Moreover, asymptotic closed-form expressions are derived to validate our results at high signal-to-noise ratio. In addition, the analytical results have been presented with compare to range of numerical values.

  6. Outage analysis of relay-assisted underwater wireless optical communication systems

    Science.gov (United States)

    Tabeshnezhad, Azadeh; Pourmina, Mohammad Ali

    2017-12-01

    In this paper, we theoretically evaluate the outage probabilities of underwater wireless optical communication (UWOC) systems. Our derivations are general as the channel model under consideration takes into account all of the channel degrading effects, namely absorption, scattering, and turbulence-induced fading. We numerically show that the UWOC systems, due to the severe channel impairments, cannot typically support longer link ranges than 100 m. Therefore, in this paper, in order to increase the transmission reliability and hence extend the viable communication range of UWOC systems, we apply decode-and-forward (DF) relay-assisted communications either in the form of multi-hop transmission, where multiple intermediate relays are serially employed between the source and destination, or parallel relaying in which multiple DF relays are distributed among the source-to-destination path to cooperate in the end-to-end transmission. Our numerical results reveal that multi-hop transmission, owing to the distance-dependency of all of the channel degrading effects, can tremendously improve the end-to-end outage probability and increase the accessible link ranges to hundreds of meter. For example, a dual-hop transmission in a 45 m coastal water link can provide up to 41 dB performance improvement at the outage probability of 10-9.

  7. An investigation of link quality assessment for mobile multi-hop and multi-rate wireless networks

    NARCIS (Netherlands)

    Zhou, J.; Jacobsson, M.; Onur, E.; Niemegeers, I.

    2011-01-01

    Wireless ad hoc networks will be an important component in future communication systems. The performance of wireless ad hoc networks can be improved by link quality-aware applications. Wireless link quality is dynamic in nature, especially in mobile scenarios. Therefore, accurate and fast packet

  8. DEHAR: a Distributed Energy Harvesting Aware Routing Algorithm for Ad-hoc Multi-hop Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Jakobsen, Mikkel Koefoed; Madsen, Jan; Hansen, Michael Reichhardt

    2010-01-01

    One of the key design goals in Wireless Sensor Networks is long lasting or even continuous operation. Continuous operation is made possible through energy harvesting. Keeping the network operational imposes a demand to prevent network segmentation and power loss in nodes. It is therefore important...

  9. Low Power Multi-Hop Networking Analysis in Intelligent Environments

    Directory of Open Access Journals (Sweden)

    Josu Etxaniz

    2017-05-01

    Full Text Available Intelligent systems are driven by the latest technological advances in many different areas such as sensing, embedded systems, wireless communications or context recognition. This paper focuses on some of those areas. Concretely, the paper deals with wireless communications issues in embedded systems. More precisely, the paper combines the multi-hop networking with Bluetooth technology and a quality of service (QoS metric, the latency. Bluetooth is a radio license-free worldwide communication standard that makes low power multi-hop wireless networking available. It establishes piconets (point-to-point and point-to-multipoint links and scatternets (multi-hop networks. As a result, many Bluetooth nodes can be interconnected to set up ambient intelligent networks. Then, this paper presents the results of the investigation on multi-hop latency with park and sniff Bluetooth low power modes conducted over the hardware test bench previously implemented. In addition, the empirical models to estimate the latency of multi-hop communications over Bluetooth Asynchronous Connectionless Links (ACL in park and sniff mode are given. The designers of devices and networks for intelligent systems will benefit from the estimation of the latency in Bluetooth multi-hop communications that the models provide.

  10. Low Power Multi-Hop Networking Analysis in Intelligent Environments.

    Science.gov (United States)

    Etxaniz, Josu; Aranguren, Gerardo

    2017-05-19

    Intelligent systems are driven by the latest technological advances in many different areas such as sensing, embedded systems, wireless communications or context recognition. This paper focuses on some of those areas. Concretely, the paper deals with wireless communications issues in embedded systems. More precisely, the paper combines the multi-hop networking with Bluetooth technology and a quality of service (QoS) metric, the latency. Bluetooth is a radio license-free worldwide communication standard that makes low power multi-hop wireless networking available. It establishes piconets (point-to-point and point-to-multipoint links) and scatternets (multi-hop networks). As a result, many Bluetooth nodes can be interconnected to set up ambient intelligent networks. Then, this paper presents the results of the investigation on multi-hop latency with park and sniff Bluetooth low power modes conducted over the hardware test bench previously implemented. In addition, the empirical models to estimate the latency of multi-hop communications over Bluetooth Asynchronous Connectionless Links (ACL) in park and sniff mode are given. The designers of devices and networks for intelligent systems will benefit from the estimation of the latency in Bluetooth multi-hop communications that the models provide.

  11. Whether and Where to Code in the Wireless Relay Channel

    DEFF Research Database (Denmark)

    Shi, Xiaomeng; Médard, Muriel; Roetter, Daniel Enrique Lucani

    2013-01-01

    the number of coding nodes while maintaining throughput. In this paper, we explore the strategic use of network coding in the wireless packet erasure relay channel according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half......-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. In addition to transmission energy, we take into account coding and reception...

  12. Advanced relay technologies in next generation wireless communications

    CERN Document Server

    Krikidis, Ioannis

    2016-01-01

    This book details the use of the cooperative networks/relaying approach in new and emerging telecommunications technologies such as full-duplex radio, massive multiple-input multiple-output (MIMO), network coding and spatial modulation, and new application areas including visible light communications (VLC), wireless power transfer, and 5G.

  13. Performance Analysis of Millimeter-Wave Multi-hop Machine-to-Machine Networks Based on Hop Distance Statistics.

    Science.gov (United States)

    Jung, Haejoon; Lee, In-Ho

    2018-01-12

    As an intrinsic part of the Internet of Things (IoT) ecosystem, machine-to-machine (M2M) communications are expected to provide ubiquitous connectivity between machines. Millimeter-wave (mmWave) communication is another promising technology for the future communication systems to alleviate the pressure of scarce spectrum resources. For this reason, in this paper, we consider multi-hop M2M communications, where a machine-type communication (MTC) device with the limited transmit power relays to help other devices using mmWave. To be specific, we focus on hop distance statistics and their impacts on system performances in multi-hop wireless networks (MWNs) with directional antenna arrays in mmWave for M2M communications. Different from microwave systems, in mmWave communications, wireless channel suffers from blockage by obstacles that heavily attenuate line-of-sight signals, which may result in limited per-hop progress in MWNs. We consider two routing strategies aiming at different types of applications and derive the probability distributions of their hop distances. Moreover, we provide their baseline statistics assuming the blockage-free scenario to quantify the impact of blockages. Based on the hop distance analysis, we propose a method to estimate the end-to-end performances (e.g., outage probability, hop count, and transmit energy) of the mmWave MWNs, which provides important insights into mmWave MWN design without time-consuming and repetitive end-to-end simulation.

  14. Deterministic Multi-hop Controlled Teleportation of Arbitrary Single-Qubit State

    Science.gov (United States)

    Peng, Jia-yin; Bai, Ming-qiang; Mo, Zhi-wen

    2017-10-01

    Multi-hop teleportation is of great significance due to long-distance delivery of quantum information and wireless quantum communication networks. In existing protocols of multi-hop teleportation, the more nodes, the smaller the success probability. In this paper, fusing the ideas of multi-hop teleportation and controlled teleportation, we put forward a scheme for implementing multi-hop controlled teleportation of single-qubit state. A set of ingenious three-qubit non-maximally entangled states are constructed to serve as the quantum channels. The information is perfectly transmitted hop by hop through teleportation under the control of the supervisors. Unit success probability can be achieved independent of channel's entanglement degree and the number of intermediate nodes. Only Pauli operations, single-qubit rotation, Hadamard gate, controlled-NOT gate, Bell-state measurement and single-qubit measurement are used in our scheme, so this scheme is easily realized in physical experiment.

  15. Coordination of Regenerative Relays and Direct Users in Wireless Cellular Networks

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar

    2011-01-01

    The area of wireless cooperation/relaying has recently been significantly enriched by the ideas of wireless network coding (NC), which bring substantial gains in spectral efficiency. These gains have mainly been demonstrated in scenarios with two-way relaying. Inspired by the ideas of wireless NC...

  16. Improved Relay Node Placement Algorithm for Wireless Sensor Networks Application in Wind Farm

    DEFF Research Database (Denmark)

    Chen, Qinyin; Hu, Y.; Chen, Zhe

    2013-01-01

    An emergent application of Wireless Sensor Network (WSN) technology is in the area of Wind Farm Monitoring (WFM), in which relays are used to connect sensors. Key problems to solve in WFM include how to balance loads across relay nodes and how to place relay nodes for redundancy and fault...

  17. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks.

    Science.gov (United States)

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-06-29

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels.

  18. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks †

    Science.gov (United States)

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-01-01

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels. PMID:26131675

  19. Two-Way Multi-Antenna Relaying with Simultaneous Wireless Information and Power Transfer

    Directory of Open Access Journals (Sweden)

    Thanaphat Srivantana

    2017-03-01

    Full Text Available In this paper, we propose various kinds of two-way multi-antenna relaying with simultaneous wireless information and power transfer (SWIPT and investigate their performance. Specifically, we first consider a two-way relay network where two single-antenna end nodes communicate with each other through a multi-antenna relay node that is energy constrained. This relay node harvests energy from the two end nodes and use the harvested energy for forwarding their information. Six relaying schemes that support the considered network then build on the power splitting-based relaying and time switching-based relaying protocols. The average bit error rates of these schemes are evaluated and compared by computer simulations considering several network parameters, including the number of relay antennas, power splitting ratio, and energy harvesting time. Such evaluation and comparison provide useful insights into the performance of SWIPT-based two-way multi-antenna relaying.

  20. A study on Relay Effect via Magnetic Resonant Coupling for Wireless Power Transfer

    Directory of Open Access Journals (Sweden)

    Rashid N.A.

    2016-01-01

    Full Text Available Wireless power transfer (WPT transmits electrical energy from a power source to an electrical load wirelessly or without any conductors. The capability of WPT to transmit the energy is limited. Therefore, a relay was introduced to increase the distance of the WPT capabilities. The effect of the relay has been investigated to extend the energy transfer distance. The effect of relay was demonstrated by placing a relay coil between transmitter and receiver, relay biased to transmitter and placing two relay coils in the designed system. Experimental results are provided to prove the concept of the relay effect. The power transmission efficiency can be achieved up to 75% at 1 meter distance.

  1. Coordinated Transmissions to Direct and Relayed Users in Wireless Cellular Systems

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar; Kaneko, Megumi

    2011-01-01

    the interference. In this paper we use these principles to devise new transmission schemes in wireless cellular systems that feature both users served directly by the base stations (direct users) and users served through relays (relayed users). We present four different schemes for coordinated transmission...... of uplink and downlink traffic in which one direct and one relayed user are served. These schemes are then used as building blocks in multi–user scenarios, where we present several schemes for scheduling pairs of users for coordinated transmissions. The optimal scheme involves exhaustive search of the best......The ideas of wireless network coding at the physical layer promise high throughput gains in wireless systems with relays and multi–way traffic flows. This gain can be ascribed to two principles: (1) joint transmission of multiple communication flows and (2) usage of a priori information to cancel...

  2. Simultaneous Wireless Information and Power Transfer for MIMO Amplify-and-Forward Relay Systems

    KAUST Repository

    Benkhelifa, Fatma

    2016-01-06

    In this paper, we investigate the simultaneous wireless information and power transfer (SWIPT) for the two-hop Multiple-Input Multiple-Output (MIMO) Amplify-and-Forward (AF) relay communication systems with the multiantenna energy harvesting relay. We derive the optimal source and relay covariance matrices to characterize the achievable region between the sourcedestination rate and the harvested energy at the relay, namely Rate-Energy (R-E) region. In this context, we consider the ideal scenario where the energy harvester (EH) receiver and the information decoder (ID) receiver at the relay can simultaneously decode the information and harvest the energy at the relay. Then, we consider more practical schemes which are the power splitting (PS) and the time switching (TS) which separate the EH and ID transfer over the power domain and the time domain, respectively.

  3. Simultaneous Wireless Information and Power Transfer for Decode-and-Forward MIMO Relay Communication Systems

    KAUST Repository

    Benkhelifa, Fatma

    2015-05-01

    In this paper, we investigate the simultaneous wireless information and power transfer (SWIPT) for a decode-and-forward (DF) multiple-input multiple-output (MIMO) relay system where the relay is an energy harvesting node. We consider the ideal scenario where both the energy harvesting (EH) receiver and information decoding (ID) receiver at the relay have access to the whole received signal and its energy. The relay harvests the energy while receiving the signal from the source and uses the harvested power to forward the signal to the destination. We obtain the optimal precoders at the source and the relay to maximize the achievable throughput rate of the overall link. In the numerical results, the effect of the transmit power at the source and the position of the relay between the source and the destination on the maximum achievable rate are investigated. © 2015 IEEE.

  4. Amplify-and-forward relaying in wireless communications

    CERN Document Server

    Rodriguez, Leonardo Jimenez; Le-Ngoc, Tho

    2015-01-01

    This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over the air. It demonstrates how to design cost-effective relay systems that provide high spectral efficiency and fully exploit the diversity of the relay channel. The brief covers advances in achievable rates, power allocation schemes, and error performance for half-duplex (HD) and full-duplex (FD) amplify-and-forward (AF) single-relay systems. The authors discuss the capacity and respective optimal power allocation for a wide range of HD protocols ov

  5. Throughput Characterization for Cooperative Wireless Information Transmission with RF Energy Harvesting-Based Relay

    Directory of Open Access Journals (Sweden)

    Yuanyuan Yao

    2016-01-01

    Full Text Available The simultaneous wireless information and power transfer (SWIPT in a cooperative relaying system is investigated, where the relay node is self-sustained by harvesting radiofrequency (RF energy from the source node. In this paper, we propose a time switching and power splitting (TSPS protocol for the cooperative system with a mobile destination node. In the first part of the transmission slot, a portion of the received signal power is used for energy transfer, and the remaining power is used for information transmission from the source to the relay. For the remaining time of the transmission slot, information is transmitted from the relay to a mobile destination node. To coordinate the wireless information and power transfer, two transmission modes are investigated, namely, relay-assisted transmission mode and nonrelay mode, respectively. Under these two modes, the outage probability and the network throughput are characterized. By joint optimization of the power splitting and the time switching ratios, we further compare the network throughput under the two transmission modes with different parameters. Results indicate that the relay-assisted transmission mode significantly improves the throughput of the wireless network.

  6. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  7. Simultaneous Wireless Information and Power Transfer for MIMO Amplify-and-Forward Relay Systems

    KAUST Repository

    Benkhelifa, Fatma

    2016-03-28

    © 2015 IEEE. In this paper, we investigate two-hop Multiple- Input Multiple-Output (MIMO) Amplify-and-Forward (AF) relay communication systems with simultaneous wireless information and power transfer (SWIPT) at the multi-antenna energy harvesting relay. We derive the optimal source and relay covariance matrices to characterize the achievable region between the source-destination rate and the harvested energy at the relay, namely Rate-Energy (R-E) region. In this context, we consider the ideal scenario where the energy harvester (EH) receiver and the information decoder (ID) receiver at the relay can simultaneously decode the information and harvest the energy at the relay. This scheme provides an outer bound for the achievable R-E region since practical energy harvesting circuits are not yet able to harvest the energy and decode the information simultaneously. Then, we consider more practical schemes which are the power splitting (PS) and the time switching (TS) proposed in [1] and which separate the EH and ID transfer over the power domain and the time domain, respectively. In our study, we derive the boundary of the achievable R- E region and we show the effect of the source transmit power, the relay transmit power and the position of the relay between the source and the destination on the achievable R-E region for the ideal scenario and the two practical schemes.

  8. Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jae-Won Lee

    2014-10-01

    Full Text Available The long propagation delay in an underwater acoustic channel makes designing an underwater media access control (MAC protocol more challenging. In particular, handshaking-based MAC protocols widely used in terrestrial radio channels have been known to be inappropriate in underwater acoustic channels, because of the inordinately large latency involved in exchanging control packets. Furthermore, in the case of multi-hop relaying in a hop-by-hop handshaking manner, the end-to-end delay significantly increases. In this paper, we propose a new MAC protocol named cascading multi-hop reservation and transmission (CMRT. In CMRT, intermediate nodes between a source and a destination may start handshaking in advance for the next-hop relaying before handshaking for the previous node is completed. By this concurrent relaying, control packet exchange and data delivery cascade down to the destination. In addition, to improve channel utilization, CMRT adopts a packet-train method where multiple data packets are sent together by handshaking once. Thus, CMRT reduces the time taken for control packet exchange and accordingly increases the throughput. The performance of CMRT is evaluated and compared with that of two conventional MAC protocols (multiple-access collision avoidance for underwater (MACA-U and MACA-U with packet trains (MACA-UPT. The results show that CMRT outperforms other MAC protocols in terms of both throughput and end-to-end delay.

  9. Coordinated Direct and Relay Transmission with Interference Cancelation in Wireless Systems

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar

    2011-01-01

    Two-way relaying schemes in wireless systems obtain throughput gain by utilizing two features (1) jointly serve two communication flows, thus implementing network coding and (2) use of information that is a priori known to cancel interference and obtain the desired signal. Based on these principl...

  10. Relay-Assisted Partial Packet Recovery with IDMA Method in CDMA Wireless Network

    CERN Document Server

    Luo, Zhifeng; Wong, Albert Kai-sun; Qiu, Shuisheng

    2010-01-01

    Automatic Repeat Request (ARQ) is an effective technique for reliable transmission of packets in wireless networks. In ARQ, however, only a few erroneous bits in a packet will cause the entire packet to be discarded at the receiver. In this case, it's wasteful to retransmit the correct bit in the received packet. The partial packet recovery only retransmits the unreliable decoded bits in order to increase the throughput of network. In addition, the cooperative transmission based on Interleave-division multiple-access (IDMA) can obtain diversity gains with multiple relays with different locations for multiple sources simultaneously. By exploring the diversity from the channel between relay and destination, we propose a relay-assisted partial packet recovery in CDMA wireless network to improve the performance of throughput. In the proposed scheme, asynchronous IDMA iterative chip-by-chip multiuser detection is utilized as a method of multiple partial recovery, which can be a complementarity in a current CDMA ne...

  11. Design of Asymmetrical Relay Resonators for Maximum Efficiency of Wireless Power Transfer

    Directory of Open Access Journals (Sweden)

    Bo-Hee Choi

    2016-01-01

    Full Text Available This paper presents a new design method of asymmetrical relay resonators for maximum wireless power transfer. A new design method for relay resonators is demanded because maximum power transfer efficiency (PTE is not obtained at the resonant frequency of unit resonator. The maximum PTE for relay resonators is obtained at the different resonances of unit resonator. The optimum design of asymmetrical relay is conducted by both the optimum placement and the optimum capacitance of resonators. The optimum placement is found by scanning the positions of the relays and optimum capacitance can be found by using genetic algorithm (GA. The PTEs are enhanced when capacitance is optimally designed by GA according to the position of relays, respectively, and then maximum efficiency is obtained at the optimum placement of relays. The capacitance of the second resonator to nth resonator and the load resistance should be determined for maximum efficiency while the capacitance of the first resonator and the source resistance are obtained for the impedance matching. The simulated and measured results are in good agreement.

  12. Optimization of beamforming and path planning for UAV-assisted wireless relay networks

    Directory of Open Access Journals (Sweden)

    Ouyang Jian

    2014-04-01

    Full Text Available Recently, unmanned aerial vehicles (UAVs acting as relay platforms have attracted considerable attention due to the advantages of extending coverage and improving connectivity for long-range communications. Specifically, in the scenario where the access point (AP is mobile, a UAV needs to find an efficient path to guarantee the connectivity of the relay link. Motivated by this fact, this paper proposes an optimal design for beamforming (BF and UAV path planning. First of all, we study a dual-hop amplify-and-forward (AF wireless relay network, in which a UAV is used as relay between a mobile AP and a fixed base station (BS. In the network, both of the AP and the BS are equipped with multiple antennas, whereas the UAV has a single antenna. Then, we obtain the output signal-to-noise ratio (SNR of the dual-hop relay network. Based on the criterion of maximizing the output SNR, we develop an optimal design to obtain the solution of the optimal BF weight vector and the UAV heading angle. Next, we derive the closed-form outage probability (OP expression to investigate the performance of the dual-hop relay network conveniently. Finally, computer simulations show that the proposed approach can obtain nearly optimal flying path and OP performance, indicating the effectiveness of the proposed algorithm. Furthermore, we find that increasing the antenna number at the BS or the maximal heading angle can significantly improve the performance of the considered relay network.

  13. Outage Probability Analysis in Power-Beacon Assisted Energy Harvesting Cognitive Relay Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ngoc Phuc Le

    2017-01-01

    Full Text Available We study the performance of the secondary relay system in a power-beacon (PB assisted energy harvesting cognitive relay wireless network. In our system model, a secondary source node and a relay node first harvest energy from distributed PBs. Then, the source node transmits its data to the destination node with the help of the relay node. Also, fading coefficients of the links from the PBs to the source node and relay node are assumed independent but not necessarily identically distributed (i.n.i.d Nakagami-m random variables. We derive exact expressions for the power outage probability and the channel outage probability. Based on that, we analyze the total outage probability of the secondary relay system. Asymptotic analysis is also performed, which provides insights into the system behavior. Moreover, we evaluate impacts of the primary network on the performance of the secondary network with respect to the tolerant interference threshold at the primary receiver as well as the interference introduced by the primary transmitter at the secondary source and relay nodes. Simulation results are provided to validate the analysis.

  14. BER estimation for multi-hop RoFSO QAM or PSK OFDM communication systems over gamma gamma or exponentially modeled turbulence channels

    Science.gov (United States)

    Nistazakis, H. E.; Stassinakis, A. N.; Sheikh Muhammad, S.; Tombras, G. S.

    2014-12-01

    The optical wireless and in particular the radio-on-free-space-optical (RoFSO) communication systems are gaining popularity due to their high date rates, license free spectrum and adequate reliability at installation and operational costs which are much lower than comparable technologies. One significant disadvantage of these systems concerns the randomly time varying characteristics of the propagation path mainly caused by the atmospheric turbulence. In this work, we study the BER performance of a multi-hop RoFSO system which is using an orthogonal frequency division multiplexing (OFDM) scheme, with either quadrature amplitude modulation (QAM) or phase shift keying format (PSK), over atmospheric turbulence channels modeled with the gamma gamma or the negative exponential distribution. The individual RoFSO parts of the whole optical link are connected to each other by using regenerators relay nodes. The dominant impairments which are the most significant and have been taken into account are the atmospheric turbulence, the path losses, the nonlinear responsivity of the laser diode and the inter-modulation distortion effect. For this setup, we derive closed form mathematical expressions for the estimation of the BER performance for each individual OFDM RoFSO link and for the whole relayed optical communication system, as well. Finally, the corresponding numerical results, for common link's parameters, are presented.

  15. An implementation of traffic light system using multi-hop Ad hoc networks

    KAUST Repository

    Ansari, Imran Shafique

    2009-08-01

    In ad hoc networks nodes cooperate with each other to form a temporary network without the aid of any centralized administration. No wired base station or infrastructure is supported, and each host communicates via radio packets. Each host must act as a router, since routes are mostly multi-hop, due to the limited power transmission set by government agencies, (e.g. the Federal Communication Commission (FCC), which is 1 Watt in Industrial Scientific and Medical (ISM) band. The natures of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance constraint. Therefore, radio resource and power management is an important issue of any wireless network. In this paper, a design for traffic light system employing ad hoc networks is proposed. The traffic light system runs automatically based on signals sent through a multi-hop ad hoc network of \\'n\\' number of nodes utilizing the Token Ring protocol, which is efficient for this application from the energy prospective. The experiment consists of a graphical user interface that simulates the traffic lights and laptops (which have wireless network adapters) are used to run the graphical user interface and are responsible for setting up the ad hoc network between them. The traffic light system has been implemented utilizing A Mesh Driver (which allows for more than one wireless device to be connected simultaneously) and Java-based client-server programs. © 2009 IEEE.

  16. Wireless Power Transfer in Cooperative DF Relaying Networks with Log-Normal Fading

    KAUST Repository

    Rabie, Khaled M.

    2017-02-07

    Energy-harvesting (EH) and wireless power transfer in cooperative relaying networks have recently attracted a considerable amount of research attention. Most of the existing work on this topic however focuses on Rayleigh fading channels which represents outdoor environments. Unlike these studies, in this paper we analyze the performance of wireless power transfer in two-hop decode-and- forward (DF) cooperative relaying systems in indoor channels characterized by log-normal fading. Three well-known EH protocols are considered in our evaluations: a) time switching relaying (TSR), b) power splitting relaying (PSR) and c) ideal relaying receiver (IRR). The performance is evaluated in terms of the ergodic outage probability for which we derive accurate analytical expressions for the three systems under consideration. Results reveal that careful selection of the EH time and power splitting factors in the TSR- and PSR-based system are important to optimize performance. It is also presented that the optimized PSR system has near- ideal performance and that increasing the source transmit power and/or the energy harvester efficiency can further improve performance.

  17. Wifi, WiMax and LTE multi-hop mesh networks basic communication protocols and application areas

    CERN Document Server

    Wei, Hung-Yu; Dixit, Sudhir

    2013-01-01

    Wifi, WiMAX, and Cellular Multihop Networks presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in

  18. On Coverage and Capacity for Disaster Area Wireless Networks Using Mobile Relays

    Directory of Open Access Journals (Sweden)

    Guo Wenxuan

    2009-01-01

    Full Text Available Public safety organizations increasingly rely on wireless technology to provide effective communications during emergency and disaster response operations. This paper presents a comprehensive study on dynamic placement of relay nodes (RNs in a disaster area wireless network. It is based on our prior work of mobility model that characterizes the spatial movement of the first responders as mobile nodes (MNs during their operations. We first investigate the COverage-oriented Relay Placement (CORP problem that is to maximize the total number of MNs connected with the relays. Considering the network throughput, we then study the CApacity-oriented Relay Placement (CARP problem that is to maximize the aggregated data rate of all MNs. For both coverage and capacity studies, we provide each the optimal and the greedy algorithms with computational complexity analysis. Furthermore, simulation results are presented to compare the performance between the greedy and the optimal solutions for the CORP and CARP problems, respectively. It is shown that the greedy algorithms can achieve near optimal performance but at significantly lower computational complexity.

  19. Double-layer video transmission over decode-and-forward wireless relay networks using hierarchical modulation.

    Science.gov (United States)

    Nguyen, Tu V; Cosman, Pamela C; Milstein, Laurence B

    2014-04-01

    We consider a wireless relay network with a single source, a single destination, and a multiple relay. The relays are half-duplex and use the decode-and-forward protocol. The transmit source is a layered video bitstream, which can be partitioned into two layers, a base layer (BL) and an enhancement layer (EL), where the BL is more important than the EL in terms of the source distortion. The source broadcasts both layers to the relays and the destination using hierarchical 16-QAM. Each relay detects and transmits successfully decoded layers to the destination using either hierarchical 16-QAM or QPSK. The destination can thus receive multiple signals, each of which can include either only the BL or both the BL and the EL. We derive the optimal linear combining method at the destination, where the uncoded bit error rate is minimized. We also present a suboptimal combining method with a closed-form solution, which performs very close to the optimal. We use the proposed double-layer transmission scheme with our combining methods for transmitting layered video bitstreams. Numerical results show that the double-layer scheme can gain 2-2.5 dB in channel signal-to-noise ratio or 5-7 dB in video peak signal-to-noise ratio, compared with the classical single-layer scheme using conventional modulation.

  20. Full-diversity partial interference cancellation for multi-user wireless relaying networks

    KAUST Repository

    El Astal, M. T O

    2013-12-01

    We focus on the uplink channel of multi-user wireless relaying networks in a coverage extension scenario. The network consists of two users, a single half duplex (HD) relay and a destination, all equipped with multiple antennas. Perfect channel state information (CSI) is assumed to be available exclusively at the receiving nodes (i.e., the relay and the destination) while the users are assumed to be completely blind. The communication through the considered network takes place over two phases. During the first phase, both users send their information concurrently to the relay. The second phase consists of decoding the received data and forwarding it simultaneously to the destination. A transmission scheme that achieves full-diversity under partial interference cancellation (PIC) group decoding is proposed. Unlike many existing schemes, it allows the concurrent transmission in both phases while achieving the full-diversity gain of full time division multiple access (TDMA) transmission regardless of the number of antennas at each node. Numerical comparison with existing schemes in the literature is provided to corroborate our theoretical claims. It is found that our interference cancellation (IC) scheme clearly outperforms existing schemes at the expense of an affordable increase in decoding complexity at both of the relay and destination. © 2013 IEEE.

  1. Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks

    Directory of Open Access Journals (Sweden)

    Yulong Shen

    2014-03-01

    Full Text Available This work considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous work on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact result on the number of eavesdroppers one network can tolerate to ensure desired secrecy and reliability. We first study the scenario where path-loss is equal between all pairs of nodes and consider two transmission protocols there, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis and numerical results are then provided to determine the maximum number of eavesdroppers one network can tolerate to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability. We further extend our study to the more general scenario where path-loss between each pair of nodes also depends on the distance between them, for which a new transmission protocol with both preferable relay selection and good load balance as well as the corresponding theoretical analysis and numerical results are presented.

  2. An Optimal Transmission Strategy for Joint Wireless Information and Energy Transfer in MIMO Relay Channels

    Directory of Open Access Journals (Sweden)

    Dingcheng Yang

    2015-01-01

    Full Text Available An optimal resource allocation strategy for MIMO relay system is considered in simultaneous wireless information and energy transfer network, where two users with multiple antennas communicate with each other assisted by an energy harvesting MIMO relay that gathers energy from the received signal by applying time switching scheme and forwards the received signal by using the harvesting energy. It is focused on the precoder design and resource allocation strategies for the system to allocate the resources among the nodes in decode-and-forward (DF mode. Specifically, optimal precoder design and energy transfer strategy in MIMO relay channel are firstly proposed. Then, we formulate the resource allocation optimization problem. The closed-form solutions for the time and power allocation are derived. It is revealed that the solution can flexibly allocate the resource for the MIMO relay channel to maximize the sum rate of the system. Simulation results demonstrated that the performance of the proposed algorithm outperforms the traditional fixed method.

  3. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  4. Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels

    Directory of Open Access Journals (Sweden)

    T.-T. Phu

    2016-12-01

    Full Text Available In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over Nakagami-m fading channels in presence of hardware impairments. In the considered protocol, a source attempts to transmit its data to a destination by using multi-hop randomize-and-forward (RF strategy. The data transmitted by the source and relays are overheard by an eavesdropper. For performance evaluation, we derive exact expressions of probability of non-zero secrecy capacity (PoNSC, which are expressed by sums of infinite series of exponential functions and exponential integral functions. We then perform Monte Carlo simulations to verify the theoretical analysis.

  5. MCBT: Multi-Hop Cluster Based Stable Backbone Trees for Data Collection and Dissemination in WSNs

    Science.gov (United States)

    Shin, Inyoung; Kim, Moonseong; Mutka, Matt W.; Choo, Hyunseung; Lee, Tae-Jin

    2009-01-01

    We propose a stable backbone tree construction algorithm using multi-hop clusters for wireless sensor networks (WSNs). The hierarchical cluster structure has advantages in data fusion and aggregation. Energy consumption can be decreased by managing nodes with cluster heads. Backbone nodes, which are responsible for performing and managing multi-hop communication, can reduce the communication overhead such as control traffic and minimize the number of active nodes. Previous backbone construction algorithms, such as Hierarchical Cluster-based Data Dissemination (HCDD) and Multicluster, Mobile, Multimedia radio network (MMM), consume energy quickly. They are designed without regard to appropriate factors such as residual energy and degree (the number of connections or edges to other nodes) of a node for WSNs. Thus, the network is quickly disconnected or has to reconstruct a backbone. We propose a distributed algorithm to create a stable backbone by selecting the nodes with higher energy or degree as the cluster heads. This increases the overall network lifetime. Moreover, the proposed method balances energy consumption by distributing the traffic load among nodes around the cluster head. In the simulation, the proposed scheme outperforms previous clustering schemes in terms of the average and the standard deviation of residual energy or degree of backbone nodes, the average residual energy of backbone nodes after disseminating the sensed data, and the network lifetime. PMID:22454570

  6. k-CONNECTED HYBRID RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORK FOR RESTORING CONNECTIVITY

    Directory of Open Access Journals (Sweden)

    Vijayvignesh Selvaraj

    2014-06-01

    Full Text Available Wireless Sensor Network (WSN consists of a number of sensor nodes for monitoring the environment. Scenario like floods, volcanic eruptions, earthquakes, tsunamis, avalanches, hailstorms and blizzards causes the sensor nodes to be damaged. In such worst case scenario, the deployed nodes in the monitoring area may split up into several segments. As a result sensor nodes in the network cannot communicate with each other due to partitions. Our algorithm investigates a strategy for restoring such kind of damage through either placement of Relay Nodes (RN’s or repositioning the existing nodes in the network. Unlike traditional schemes like minimum spanning tree, our proposed approach generates a different topology called as spider web. In this approach, both stationary and mobile relay nodes are used. Thus we are making our topology as a hybrid one. Though the numbers of relay nodes are increased, the robust connectivity and the balanced traffic load can be ensured. The validation of the proposed approach has been simulated and verified by QualNet Developer 5.0.2.

  7. Improving Spectral Capacity and Wireless Network Coverage by Cognitive Radio Technology and Relay Nodes in Cellular Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge

    2008-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context have been presented and discussed in this paper. Ideas to improve the wireless transmission by orthogonal OFDM-based communication and to increase the...... the coverage of cellular systems by future wireless networks, relay channels, relay stations and collaborate radio have been presented as well. A revised hierarchical deployment of the future wireless and wired networks are shortly discussed.......Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context have been presented and discussed in this paper. Ideas to improve the wireless transmission by orthogonal OFDM-based communication and to increase...

  8. Buffer sizing for multi-hop networks

    KAUST Repository

    Shihada, Basem

    2014-01-28

    A cumulative buffer may be defined for an interference domain in a wireless mesh network and distributed among nodes in the network to maintain or improve capacity utilization of network resources in the interference domain without increasing packet queuing delay times. When an interference domain having communications links sharing resources in a network is identified, a cumulative buffer size is calculated. The cumulative buffer may be distributed among buffers in each node of the interference domain according to a simple division or according to a cost function taking into account a distance of the communications link from the source and destination. The network may be monitored and the cumulative buffer size recalculated and redistributed when the network conditions change.

  9. Fluid-Flow Modeling of a Relay Node in an IEEE 802.11 Wireless Ad-Hoc Network

    NARCIS (Netherlands)

    Roijers, F.; van den Berg, H; Mandjes, M.R.H.

    2007-01-01

    Abstract Wireless ad-hoc networks are based on shared medium technology where the nodes arrange access to the medium in a distributed way independent of their current traffic demand. This has the inherent drawback that a node that serves as a relay node for transmissions of multiple neighboring

  10. Fluid-flow modeling of a relay node in an IEEE 802.11 wireless ad-hoc network

    NARCIS (Netherlands)

    F. Roijers (Frank); J.L. van den Berg (Hans); M.R.H. Mandjes (Michel)

    2007-01-01

    textabstractWireless ad-hoc networks are based on shared medium technology where the nodes arrange access to the medium in a distributed way independent of their current traffic demand. This has the inherent drawback that a node that serves as a relay node for transmissions of multiple neighboring

  11. Fluid-flow modeling of a relay node in an IEEE 802.11 wireless ad-hoc network

    NARCIS (Netherlands)

    Roijers, F.; Berg, J.L. van den; Mandjes, M.

    2007-01-01

    Wireless ad-hoc networks are based on shared medium technology where the nodes arrange access to the medium in a distributed way independent of their current traffic demand. This has the inherent drawback that a node that serves as a relay node for transmissions of multiple neighboring nodes is

  12. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  13. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.

    Science.gov (United States)

    Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M

    2017-09-04

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS

  14. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

    Directory of Open Access Journals (Sweden)

    Hequn Hu

    2017-09-01

    Full Text Available The Internet of Things (IoT represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor and a destination (e.g., controller via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS and time splitting (TS policies, called intuitive secure schemes based on PS (Int-PS, precoded secure scheme based on PS (Pre-PS, intuitive secure scheme based on TS (Int-TS and precoded secure scheme based on TS (Pre-TS, respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T , which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on

  15. Orthogonal DF Cooperative Relay Networks with Multiple-SNR Thresholds and Multiple Hard-Decision Detections

    Directory of Open Access Journals (Sweden)

    Dian-Wu Yue

    2010-01-01

    Full Text Available This paper investigates a wireless cooperative relay network with multiple relays communicating with the destination over orthogonal channels. Proposed is a cooperative transmission scheme that employs two signal-to-noise ratio (SNR thresholds and multiple hard-decision detections (HDD at the destination. One SNR threshold is used to select transmitting relays, and the other threshold is used at the destination for detection. Then the destination simply combines all the hard-decision results and makes the final binary decision based on majority voting. Focusing on the decode-and-forward (DF relaying protocol, the average bit error probability is derived and diversity analysis is carried out. It is shown that the full diversity order can be achieved by setting appropriate thresholds even when the destination does not know the exact or average SNRs of the source-relay links. The performance analysis is further extended to multi-hop cooperation and/or with the presence of a direct link where multiple thresholds are needed. By combining the multiple-SNR threshold method with a selection of the best relaying link, a high spectral-efficiency cooperative transmission scheme is further presented. Simulation results verify the theoretical analysis and demonstrate performance advantage of our proposed schemes over the existing ones.

  16. Interference Drop Scheme: Enhancing QoS Provision in Multi-Hop Ad Hoc Networks

    Science.gov (United States)

    Luo, Chang-Yi; Komuro, Nobuyoshi; Takahashi, Kiyoshi; Kasai, Hiroyuki; Ueda, Hiromi; Tsuboi, Toshinori

    Ad hoc networking uses wireless technologies to construct networks with no physical infrastructure and so are expected to provide instant networking in areas such as disaster recovery sites and inter-vehicle communication. Unlike conventional wired networks services, services in ad hoc networks are easily disrupted by the frequent changes in traffic and topology. Therefore, solutions to assure the Quality of Services (QoS) in ad hoc networks are different from the conventional ones used in wired networks. In this paper, we propose a new queue management scheme, Interference Drop Scheme (IDS) for ad hoc networks. In the conventional queue management approaches such as FIFO (First-in First-out) and RED (Random Early Detection), a queue is usually managed by a queue length limit. FIFO discards packets according to the queue limit, and RED discards packets in an early and random fashion. IDS, on the other hand, manages the queue according to wireless interference time, which increases as the number of contentions in the MAC layer increases. When there are many MAC contentions, IDS discards TCP data packets. By observing the interference time and discarding TCP data packets, our simulation results show that IDS improves TCP performance and reduces QoS violations in UDP in ad hoc networks with chain, grid, and random topologies. Our simulation results also demonstrate that wireless interference time is a better metric than queue length limit for queue management in multi-hop ad hoc networks.

  17. Performance Analysis of RF-FSO Multi-Hop Networks

    KAUST Repository

    Makki, Behrooz

    2017-05-12

    We study the performance of multi-hop networks composed of millimeter wave (MMW)-based radio frequency (RF) and free-space optical (FSO) links. The results are obtained in the cases with and without hybrid automatic repeat request (HARQ). Taking the MMW characteristics of the RF links into account, we derive closed-form expressions for the network outage probability. We also evaluate the effect of various parameters such as power amplifiers efficiency, number of antennas as well as different coherence times of the RF and the FSO links on the system performance. Finally, we present mappings between the performance of RF- FSO multi-hop networks and the ones using only the RF- or the FSO-based communication, in the sense that with appropriate parameter settings the same outage probability is achieved in these setups. The results show the efficiency of the RF-FSO setups in different conditions. Moreover, the HARQ can effectively improve the outage probability/energy efficiency, and compensate the effect of hardware impairments in RF-FSO networks. For common parameter settings of the RF-FSO dual- hop networks, outage probability 10^{-4} and code rate 3 nats-per-channel-use, the implementation of HARQ with a maximum of 2 and 3 retransmissions reduces the required power, compared to the cases with no HARQ, by 13 and 17 dB, respectively.

  18. Design Criteria for Hierarchical Exclusive Code with Parameter-Invariant Decision Regions for Wireless 2-Way Relay Channel

    Directory of Open Access Journals (Sweden)

    Tomas Uricar

    2010-01-01

    Full Text Available The unavoidable parametrization of the wireless link represents a major problem of the network-coded modulation synthesis in a 2-way relay channel. Composite (hierarchical codeword received at the relay is generally parametrized by the channel gain, forcing any processing on the relay to be dependent on channel parameters. In this paper, we introduce the codebook design criteria, which ensure that all permissible hierarchical codewords have decision regions invariant to the channel parameters (as seen by the relay. We utilize the criterion for parameter-invariant constellation space boundary to obtain the codebooks with channel parameter-invariant decision regions at the relay. Since the requirements on such codebooks are relatively strict, the construction of higher-order codebooks will require a slightly simplified design criteria. We will show that the construction algorithm based on these relaxed criteria provides a feasible way to the design of codebooks with arbitrary cardinality. The promising performance benefits of the example codebooks (compared to a classical linear modulation alphabets will be exemplified on the minimum distance analysis.

  19. AUTONOMOUS MOVEMENT OF MOBILE RELAYS IN WIRELESS SENSOR NETWORK TO ENHANCE NETWORK LIFETIME

    Directory of Open Access Journals (Sweden)

    Regis W. Anne

    2014-06-01

    Full Text Available Wireless Sensor Network (WSN is a collection of intelligent sensors that communicate and coordinate in an energy constrained environment. Due to the limited energy supply of the sensors, lifetime problems arise in static WSN. One of the potential solutions to this problem is a mobility-assisted WSN. Mobility can be introduced by adding extra entities like mobile sinks, mobile cluster-head or mobile relays (MRs to the existing static WSN. The entities can significantly improve the functionality and performance of the WSN by making it flexible to failures, ease data collection, increase energy efficiency, enhance connectivity, improve coverage and prolong network lifetime. The need of today’s applications demands mobility-assisted WSN instead of the traditional static WSN. In this paper, we control the movement of MRs to maximize network lifetime. A distributed algorithm for controlling the movement of MRs is given and its performance is validated for the network parameters such as network lifetime and average residual energy. The proposed method shows that lifetime can be improved compared to that of a static network.

  20. OPTIMASI OLSR ROUTING PROTOCOL PADA JARINGAN WIRELESS MESH DENGAN ADAPTIVE REFRESHING TIME INTERVAL DAN ENHANCE MULTI POINT RELAY SELECTING ALGORITHM

    Directory of Open Access Journals (Sweden)

    Faosan Mapa

    2014-01-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Wireless Mesh Network (WMN adalah suatu konektivitas jaringan yang self-organized, self-configured dan multi-hop. Tujuan dari WMN adalah menawarkan pengguna suatu bentuk jaringan nirkabel yang dapat dengan mudah berkomunikasi dengan jaringan konvensional dengan kecepatan tinggi dan dengan cakupan yang lebih luas serta biaya awal yang minimal. Diperlukan suatu desain protokol routing yang efisien untuk WMN yang secara adaptif dapat mendukung mesh routers dan mesh clients. Dalam tulisan ini, diusulkan untuk mengoptimalkan protokol OLSR, yang merupakan protokol routing proaktif. Digunakan heuristik yang meningkatkan protokol OLSR melalui adaptive refreshing time interval dan memperbaiki metode MPR selecting algorithm. Suatu analisa dalam meningkatkan protokol OLSR melalui adaptive refreshing time interval dan memperbaiki algoritma pemilihan MPR menunjukkan kinerja yang signifikan dalam hal throughput jika dibandingkan dengan protokol OLSR yang asli. Akan tetapi, terdapat kenaikan dalam hal delay. Pada simulasi yang dilakukan dapat disimpulkan bahwa OLSR dapat dioptimalkan dengan memodifikasi pemilihan node MPR berdasarkan cost effective dan penyesuaian waktu interval refreshing hello message sesuai dengan keadaan

  1. Exploiting Multi-user Diversity and Multi-hop Diversity in Dual-hop Broadcast Channels

    KAUST Repository

    Zafar, Ammar

    2013-05-21

    We propose joint user-and-hop scheduling over dual-hop block-fading broadcast channels in order to exploit multi-user diversity gains and multi-hop diversity gains all together. To achieve this objective, the first and second hops are scheduled opportunistically based on the channel state information. The joint scheduling problem is formulated as maximizing the weighted sum of the long term achievable rates of the users under a stability constraint, which means that in the long term the rate received by the relay should equal the rate transmitted by it, in addition to power constraints. We show that this problem is equivalent to a single-hop broadcast channel by treating the source as a virtual user with an optimal weight that maintains the stability constraint. We show how to obtain the source weight either off-line based on channel statistics or on real-time based on channel measurements. Furthermore, we consider special cases including the maximum sum-rate scheduler and the proportional fair scheduler. We also show how to extend the scheme into one that allows multiple user scheduling via superposition coding with successive decoding. Numerical results demonstrate that our proposed joint scheduling scheme enlarges the rate region as compared to scheduling schemes that exploit the diversity gains partially.

  2. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  3. Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2017-01-01

    Full Text Available An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.

  4. Self-Optimization of Handover Parameters for Long-Term Evolution with Dual Wireless Mobile Relay Nodes

    Directory of Open Access Journals (Sweden)

    Battulga Davaasambuu

    2015-06-01

    Full Text Available In recent years, train passengers have been transferring increasing amounts of data using mobile devices. Wireless networks with mobile relay nodes support broadband wireless communications for passengers of such vehicles using backhaul links. However, the mobility management entity reuses the handover of existing user equipment, resulting in the handover of the Long-Term Evolution network being unsuitable for user equipment within the cabins of vehicles traveling at high speed. In this paper, we propose a self-optimizing handover hysteresis scheme with dual mobile relay nodes for wireless networks in high-speed mobile environments. The proposed mechanism tunes the hysteresis and cell individual offset handover parameters based on the velocity of the vehicle and the handover performance indicator, which affects the handover triggering decision and performance. The results of simulations conducted in which the performance of the proposed scheme was compared to that of an existing scheme show that the proposed scheme can reduce the number of radio link failures and service interruptions during handover procedures.

  5. Sum of ratios of products forα-μ random variables in wireless multihop relaying and multiple scattering

    KAUST Repository

    Wang, Kezhi

    2014-09-01

    The sum of ratios of products of independent 2642 2642α-μ random variables (RVs) is approximated by using the Generalized Gamma ratio approximation (GGRA) with Gamma ratio approximation (GRA) as a special case. The proposed approximation is used to calculate the outage probability of the equal gain combining (EGC) or maximum ratio combining (MRC) receivers for wireless multihop relaying or multiple scattering systems considering interferences. Numerical results show that the newly derived approximation works very well verified by the simulation, while GRA has a slightly worse performance than GGRA when outage probability is below 0.1 but with a more simplified form.

  6. On the benefits of location-based relay selection in mobile wireless networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2016-01-01

    We consider infrastructure-based mobile networks that are assisted by a single relay transmission where both the downstream destination and relay nodes are mobile. Selecting the optimal transmission path for a destination node requires up-to-date link quality estimates of all relevant links. If t...

  7. Whether and Where to Code in the Wireless Packet Erasure Relay Channel

    DEFF Research Database (Denmark)

    Shi, Xiaomeng; Medard, Muriel; Lucani Rötter, Daniel Enrique

    2013-01-01

    energies. We show that coding at the relay alone while operating in a rateless fashion is neither throughput nor energy efficient. Given a set of system parameters, our analysis determines the optimal amount of time the relay should participate in the transmission, and where coding should be performed....

  8. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility.

    Science.gov (United States)

    Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao

    2016-01-18

    Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination's home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination's home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays.

  9. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks.

    Science.gov (United States)

    Perumal, Madhumathy; Dhandapani, Sivakumar

    2015-01-01

    Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  10. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  11. Opportunistic Buffered Decode-Wait-and-Forward (OBDWF) Protocol for Mobile Wireless Relay Networks

    CERN Document Server

    Wang, Rui; Huang, Huang

    2011-01-01

    In this paper, we propose an opportunistic buffered decode-wait-and-forward (OBDWF) protocol to exploit both relay buffering and relay mobility to enhance the system throughput and the end-to-end packet delay under bursty arrivals. We consider a point-to-point communication link assisted by K mobile relays. We illustrate that the OBDWF protocol could achieve a better throughput and delay performance compared with existing baseline systems such as the conventional dynamic decode-and-forward (DDF) and amplified-and-forward (AF) protocol. In addition to simulation performance, we also derived closed-form asymptotic throughput and delay expressions of the OBDWF protocol. Specifically, the proposed OBDWF protocol achieves an asymptotic throughput O(logK) with O(1) total transmit power in the relay network. This is a significant gain compared with the best known performance in conventional protocols (O(logK) throughput with O(K) total transmit power). With bursty arrivals, we show that both the stability region and...

  12. Energy Efficiency and Goodput Analysis in Two-Way Wireless Relay Networks

    CERN Document Server

    Chen, Qing

    2011-01-01

    In this paper, we study two-way relay networks (TWRNs) in which two source nodes exchange their information via a relay node indirectly in Rayleigh fading channels. Both Amplify-and-Forward (AF) and Decode-and-Forward (DF) techniques have been analyzed in the TWRN employing a Markov chain model through which the network operation is described and investigated in depth. Automatic Repeat-reQuest (ARQ) retransmission has been applied to guarantee the successful packet delivery. The bit energy consumption and goodput expressions have been derived as functions of transmission rate in a given AF or DF TWRN. Numerical results are used to identify the optimal transmission rates where the bit energy consumption is minimized or the goodput is maximized. The network performances are compared in terms of energy and transmission efficiency in AF and DF modes.

  13. Wireless Powered Cooperative Communications: Power Splitting Relaying With Energy Accumulation (Author’s Manuscript)

    Science.gov (United States)

    2016-03-21

    Power splitting unit Signal conversion noise ( ),k Rx t ( ),k Fp t Battery ( ),k Rp t Power amplifier unit The first phase The second phase ( ),k Fb t... power not only amplifies the useful signal but also the noise . This tradeoff is realized by controlling the transmit power at the relays in...received RF signal into two different power streams for separate WPT and WIT, and the other is based on time switching technique, where the received

  14. An adaptive resource control mechanism in multi-hop ad-hoc networks

    NARCIS (Netherlands)

    Yang, Y.; Heijenk, Geert; Haverkort, Boudewijn R.H.M.; Masip Bruin, Xavier; Verchere, Dominique; Tsaoussidis, Vassilis; Yannuzzi, Marcelo

    This paper presents an adaptive resource control mechanism for multi-hop ad-hoc network systems, which avoids bottleneck problems caused by the node-fairness property of IEEE 802.11. In our proposal, the feedback information from the downstream bottleneck, derived from Request-To-Send (RTS) and

  15. Statistics of α-μ Random Variables and Their Applications inWireless Multihop Relaying and Multiple Scattering Channels

    KAUST Repository

    Wang, Kezhi

    2015-06-01

    Exact results for the probability density function (PDF) and cumulative distribution function (CDF) of the sum of ratios of products (SRP) and the sum of products (SP) of independent α-μ random variables (RVs) are derived. They are in the form of 1-D integral based on the existing works on the products and ratios of α-μ RVs. In the derivation, generalized Gamma (GG) ratio approximation (GGRA) is proposed to approximate SRP. Gamma ratio approximation (GRA) is proposed to approximate SRP and the ratio of sums of products (RSP). GG approximation (GGA) and Gamma approximation (GA) are used to approximate SP. The proposed results of the SRP can be used to calculate the outage probability (OP) for wireless multihop relaying systems or multiple scattering channels with interference. The proposed results of the SP can be used to calculate the OP for these systems without interference. In addition, the proposed approximate result of the RSP can be used to calculate the OP of the signal-To-interference ratio (SIR) in a multiple scattering system with interference. © 1967-2012 IEEE.

  16. Fuzzy-Logic Based Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    Science.gov (United States)

    Zhang, Ying; Wang, Jun; Han, Dezhi; Wu, Huafeng; Zhou, Rundong

    2017-01-01

    Due to the high-energy efficiency and scalability, the clustering routing algorithm has been widely used in wireless sensor networks (WSNs). In order to gather information more efficiently, each sensor node transmits data to its Cluster Head (CH) to which it belongs, by multi-hop communication. However, the multi-hop communication in the cluster brings the problem of excessive energy consumption of the relay nodes which are closer to the CH. These nodes’ energy will be consumed more quickly than the farther nodes, which brings the negative influence on load balance for the whole networks. Therefore, we propose an energy-efficient distributed clustering algorithm based on fuzzy approach with non-uniform distribution (EEDCF). During CHs’ election, we take nodes’ energies, nodes’ degree and neighbor nodes’ residual energies into consideration as the input parameters. In addition, we take advantage of Takagi, Sugeno and Kang (TSK) fuzzy model instead of traditional method as our inference system to guarantee the quantitative analysis more reasonable. In our scheme, each sensor node calculates the probability of being as CH with the help of fuzzy inference system in a distributed way. The experimental results indicate EEDCF algorithm is better than some current representative methods in aspects of data transmission, energy consumption and lifetime of networks. PMID:28671641

  17. Resource Optimization Scheme for Multimedia-Enabled Wireless Mesh Networks

    Science.gov (United States)

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md. Jalil; Suh, Doug Young

    2014-01-01

    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment. PMID:25111241

  18. Resource optimization scheme for multimedia-enabled wireless mesh networks.

    Science.gov (United States)

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md Jalil; Suh, Doug Young

    2014-08-08

    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment.

  19. How Effective is Routing for Wireless Networking

    Science.gov (United States)

    2016-03-05

    world examples of multi-hop wireless networks. Today, almost all of our wireless devices communicate directly with a base station (such as WiFi or...a link towards the next waypoint. Since routing Distribution A: Public Release. This work is sponsored by the Defense Advanced Research Program...prevents these schemes from working well in a wireless environment. The idea of a link is borrowed from wired networks. In a wireless network, there is no

  20. Improving Data Dissemination in Multi-Hop Cognitive Radio Ad-Hoc Networks

    OpenAIRE

    Rehmani, Mubashir Husain; Carneiro Viana, Aline; Khalife, Hicham; Fdida, Serge

    2011-01-01

    International audience; In this paper, we present SURF, a distributed channel selection strategy for efficient data dissemination in multi-hop cognitive radio ad-hoc networks (CRNs). SURF classifies the available channels on the basis of primary radio unoccupancy and the number of cognitive radio neighbors using the channels. Through extensive NS-2 simulations, we compare the performance of SURF with three related approaches. Simulation results confirm that SURF is effective in selecting the ...

  1. A Double Rate Localization Algorithm with One Anchor for Multi-Hop Underwater Acoustic Networks.

    Science.gov (United States)

    Gao, Jingjie; Shen, Xiaohong; Zhao, Ruiqin; Mei, Haodi; Wang, Haiyan

    2017-04-28

    Localization is a basic issue for underwater acoustic networks (UANs). Currently, most localization algorithms only perform well in one-hop networks or need more anchors which are not suitable for the underwater environment. In this paper, we proposed a double rate localization algorithm with one anchor for multi-hop underwater acoustic networks (DRL). The algorithm firstly presents a double rate scheme which separates the localization procedure into two modes to increase the ranging accuracy in multi-hop UANs while maintaining the transmission rate. Then an optimal selection scheme of reference nodes was proposed to reduce the influence of references' topology on localization performance. The proposed DRL algorithm can be used in the multi-hop UANs to increase the localization accuracy and reduce the usage of anchor nodes. The simulation and experimental results demonstrated that the proposed DRL algorithm has a better localization performance than the previous algorithms in many aspects such as accuracy and communication cost, and is more suitable to the underwater environment.

  2. Evaluation of Potential Relay Locations in a Urban Macro-Cell Scenario with Applicability to LTE-A

    DEFF Research Database (Denmark)

    Rodriguez, Ignacio; Coletti, Claudio; Sørensen, Troels Bundgaard

    2012-01-01

    Relay base stations are expected to play an important role in extending coverage for beyond 3G networks, such as LTE-A. However, the signal quality experienced on the backhaul link between the macro-cell and the relay node has a major impact on the performance of the multi-hop transmission....... This paper presents a measurement-based study focusing on the performance evaluation of the relay backhaul link for different potential relay locations and antenna configurations in a real urban macro-cell scenario. Based on the assumption that a similar network deployment would apply for LTE-A, a fully...... operational 3G network has been used for measuring both received signal strength and Signal-to-Interference-Ratio (SIR). Furthermore, the results have been used to estimate the performance of the multi-hop transmission under simplifying assumptions. The experimental results show that by increasing the relay...

  3. Interleaving Gains for Receive Diversity Schemes of Distributed Turbo Codes in Wireless Half–Duplex Relay Channels

    Directory of Open Access Journals (Sweden)

    Tamer H. M. Soliman

    2015-06-01

    Full Text Available This paper proposes the interleaving gain in two different distributed turbo-coding schemes: Distributed Turbo Codes (DTC and Distributed Multiple Turbo Codes (DMTC for half-duplex relay system as an extension of our previous work on turbo coding interleaver design for direct communication channel. For these schemes with half-duplex constraint, the source node transmits its information with the parity bit sequence(s to both the relay and the destination nodes during the first phase. The relay received the data from the source and process it by using decode and forward protocol. For the second transmission period, the decoded systematic data at relay is interleaved and re-encoded by a Recursive Systematic Convolutional (RSC encoder and forwarded to the destination. At destination node, the signals received from the source and relay are processed by using turbo log-MAP iterative decoding for retrieving the original information bits. We demonstrate via simulations that the interleaving gain has a large effect with DTC scheme when we use only one RSC encoder at both the source and relay with best performance when using Modified Matched S-Random (MMSR interleaver. Furthermore, by designing a Chaotic Pseudo Random Interleaver (CPRI as an outer interleaver at the source node instead of classical interleavers, our scheme can add more secure channel conditions.

  4. Energy Efficient Clustering in Multi-hop Wireless Sensor Networks Using Differential Evolutionary MOPSO

    Directory of Open Access Journals (Sweden)

    D. Rajendra Prasad

    Full Text Available ABSTRACT The primary challenge in organizing sensor networks is energy efficacy. This requisite for energy efficacy is because sensor nodes capacities are limited and replacing them is not viable. This restriction further decreases network lifetime. Node lifetime varies depending on the requisites expected of its battery. Hence, primary element in constructing sensor networks is resilience to deal with decreasing lifetime of all sensor nodes. Various network infrastructures as well as their routing protocols for reduction of power utilization as well as to prolong network lifetime are studied. After analysis, it is observed that network constructions that depend on clustering are the most effective methods in terms of power utilization. Clustering divides networks into inter-related clusters such that every cluster has several sensor nodes with a Cluster Head (CH at its head. Sensor gathered information is transmitted to data processing centers through CH hierarchy in clustered environments. The current study utilizes Multi-Objective Particle Swarm Optimization (MOPSO-Differential Evolution (DE (MOPSO-DE technique for optimizing clustering.

  5. Turbo codes for multi-hop wireless sensor networks with decode-and-forward mechanism

    National Research Council Canada - National Science Library

    Abughalieh, Nashat; Steenhaut, Kris; Nowé, Ann; Anpalagan, Alagan

    2014-01-01

    .... Error correcting codes (ECCs) can be used to reduce number of retransmissions, but most ECCs have complex decoding algorithms, which leads to high processing energy consumption at the receiving nodes in the WSN...

  6. A Stochastic Geometry Model for Multi-hop Highway Vehicular Communication

    KAUST Repository

    Farooq, Muhammad Junaid

    2015-11-19

    Carrier sense multiple access (CSMA) protocol is standardized for vehicular communication to ensure a distributed and efficient communication between vehicles. However, several vehicular applications require efficient multi-hop information dissemination. This paper exploits stochastic geometry to develop a tractable and accurate modeling framework to characterize the multi-hop transmissions for vehicular networks in a multi-lane highway setup. In particular, we study the tradeoffs between per-hop packet forward progress, per-hop transmission success probability, and spatial frequency reuse (SFR) efficiency imposed by different packet forwarding schemes, namely, most forward with fixed radius (MFR), the nearest with forward progress (NFP), and the random with forward progress (RFP). We also define a new performance metric, denoted as the aggregate packet progress (APP), which is a dimensionless quantity that captures the aforementioned tradeoffs. To this end, the developed model reveals the interplay between the spectrum sensing threshold (th) of the CSMA protocol and the packet forwarding scheme. Our results show that, in contrary to ALOHA networks which always favor NFP, MFR may achieve the highest APP in CSMA networks if th is properly chosen.

  7. Multi-Hop-Enabled Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Khaja Shazzad

    2015-09-01

    Full Text Available In multi-hop underwater acoustic sensor networks (UWASNs, packet collisions due to hidden and local nodes adversely affect throughput, energy efficiency and end-to-end delay. Existing medium access control (MAC protocols try to solve the problem by utilizing a single-phase contention resolution mechanism, which causes a large number of control packet exchanges and energy overhead. In this paper, we introduce a MAC protocol that splits this single-phase contention resolution mechanism into two phases to provide efficient multi-hop networking. In the first phase, local nodes are eliminated from the contention, and in the later phase, the adverse effects of hidden nodes are mitigated. This two-phased contention resolution provides higher energy efficiency, better throughput and shorter end-to-end delay, and it also enables adaptability for different network architectures. A probabilistic model of the proposed protocol is also developed to analyse the performance. The proposed protocol has been evaluated through quantitative analysis and simulation. Results obtained through quantitative analysis and simulation reveal that the proposed protocol achieves significantly better energy efficiency, higher and more stable throughput and lower end-to-end delay compared to existing protocols, namely T-Lohi and slotted floor acquisition multiple access (S-FAMA.

  8. Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications

    Directory of Open Access Journals (Sweden)

    Leila Melki

    2016-11-01

    Full Text Available In a cellular network it's very difficult to make spectrum resource more efficiently. Device-to-Device (D2D technology enables new service opportunities, and provides high throughput and reliable communication while reducing the base station load. For better total performance, short-range D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. Here we argue that single-hop D2D technology can be used to further improve cellular networks performance if the key D2D radio resource management algorithms are suitably extended to support multi-hop D2D communications. Aiming to establish a new paradigm for the analysis and design of multi-hop D2D communications, We propose a radio resource allocation for multi-hop D2D routes based on interference avoidance approach in LTE-A networks. On top of that, we investigate the outage probability of D2D communication. We first introduce a new definition of outage probability by considering the maximum distance to be allowable for single-hop transmission. Then we study and analyze the outage performance of a multi-hop D2D route. We derive the general closed form expression of outage probability of the multi-hop D2D routes. The results demonstrate that the D2D radio, sharing the same resources as the cellular network, provide higher capacity compared to pure cellular communication where all the data is transmitted through the base station. They also demonstrate that the new method of calculation of D2D multi hop outage probability has better performance than classical method defined in the literature.

  9. Optimal Routing for Decode-and-Forward based Cooperation in Wireless Networks

    CERN Document Server

    Ong, Lawrence

    2007-01-01

    We investigate cooperative wireless relay networks in which the nodes can help each other in data transmission. We study different coding strategies in the single-source single-destination network with many relay nodes. Given the myriad of ways in which nodes can cooperate, there is a natural routing problem, i.e., determining an ordered set of nodes to relay the data from the source to the destination. We find that for a given route, the decode-and-forward strategy, which is an information theoretic cooperative coding strategy, achieves rates significantly higher than that achievable by the usual multi-hop coding strategy, which is a point-to-point non-cooperative coding strategy. We construct an algorithm to find an optimal route (in terms of rate maximizing) for the decode-and-forward strategy. Since the algorithm runs in factorial time in the worst case, we propose a heuristic algorithm that runs in polynomial time. The heuristic algorithm outputs an optimal route when the nodes transmit independent codew...

  10. Cluster-based Data Gathering in Long-Strip Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    FANG, W.

    2012-02-01

    Full Text Available This paper investigates a special class of wireless sensor networks that are different from traditional ones in that the sensor nodes in this class of networks are deployed along narrowly elongated geographical areas and form a long-strip topology. According to hardware capabilities of current sensor nodes, a cluster-based protocol for reliable and efficient data gathering in long-strip wireless sensor networks (LSWSN is proposed. A well-distributed cluster-based architecture is first formed in the whole network through contention-based cluster head election. Cluster heads are responsible for coordination among the nodes within their clusters and aggregation of their sensory data, as well as transmission the data to the sink node on behalf of their own clusters. The intra-cluster coordination is based on the traditional TDMA schedule, in which the inter-cluster interference caused by the border nodes is solved by the multi-channel communication technique. The cluster reporting is based on the CSMA contention, in which a connected overlay network is formed by relay nodes to forward the data from the cluster heads through multi-hops to the sink node. The relay nodes are non-uniformly deployed to resolve the energy-hole problem which is extremely serious in the LSWSN. Extensive simulation results illuminate the distinguished performance of the proposed protocol.

  11. Fair packet scheduling in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2014-02-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs. TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity across a large number of topologies.

  12. Challenge: How Effective is Routing for Wireless Networking

    Science.gov (United States)

    2017-03-03

    Approved for Public Release, Distribution Unlimited Challenge: How Effective is Routing for Wireless Networking ? Greg Kuperman, Scott Moore, Bow-Nan...paper, we examine the question of how effective rout- ing is for reliably and efficiently delivering data in a wireless network . With the emergence of the...Internet of Things, there is a renewed focus on multi-hop wireless networking to con- nect these systems of smart-devices. Many of the proposals to

  13. Uplink capacity of multi-class IEEE 802.16j relay networks with adaptive modulation and coding

    DEFF Research Database (Denmark)

    Wang, Hua; Xiong, C; Iversen, Villy Bæk

    2009-01-01

    The emerging IEEE 802.16j mobile multi-hop relay (MMR) network is currently being developed to increase the user throughput and extend the service coverage as an enhancement of existing 802.16e standard. In 802.16j, the intermediate relay stations (RSs) help the base station (BS) communicate...... with those mobile stations (MSs) that are either too far away from the BS or placed in an area where direct communication with BS experiences unsatisfactory level of service. In this paper, we investigate the uplink Erlang capacity of a two-hop 802.16j relay system supporting both voice and data traffics...

  14. Identification of influential nodes based on temporal-aware modeling of multi-hop neighbor interactions for influence spread maximization

    Science.gov (United States)

    Ullah, Farman; Lee, Sungchang

    2017-11-01

    This paper presents the identification of highly influential nodes based on temporal-aware modeling of multi-hop neighbor interactions to maximize the spread of information in online social networks (OSNs). The objective is to choose a set of influential nodes that have higher temporal multi-hop interactions and more topological connections in large-scale OSNs to maximize information dissemination and minimize spreading time. An influence diffusion process that is solely based on topology is not able to capture the influence spreading efficiently. A temporal multi-hops social interaction based centrality is proposed to choose nodes of higher spreading ability considering the nodes' neighbors and neighbors-of-neighbors temporal modeled interactions and topological connections. The temporal-aware interactions are modeled to find users who are more active recently. First, we model the influence between users considering the temporal interactions of the user and its neighbors. A subset of nodes with a higher influence value and more topological connections with direct neighbors is selected. Secondly, we select the Top- K higher influential spreader nodes from the subset of nodes considering the node neighbors and neighbors-of-neighbors temporal modeled social interactions and topological connections. Finally, the proposed algorithm is evaluated using the epidemic spreading models. The experimental results show that the algorithm is able to extract highly influential nodes that maximize the spread of information and minimize contagion time.

  15. Relay race

    CERN Multimedia

    Staff Association

    2011-01-01

    The CERN relay race will take place around the Meyrin site on Thursday 19th May starting at 12·15. If possible, please avoid driving on the site during this 20-minute period. If you do meet runners while driving your car, please STOP until they have all passed. Thank you for your cooperation. Details on the course, and how to register your team for the relay race, can be found at: https://espace.cern.ch/Running-Club/CERN-Relay Some advice for all runners from the medical service can also be found here: https://espace.cern.ch/Running-Club/CERN-Relay/RelayPagePictures/MedicalServiceAnnoncement.pdf

  16. Relay race

    CERN Multimedia

    Staff Association

    2011-01-01

    The CERN relay race will take place around the Meyrin site on Thursday 19th May starting at 12:15. If possible, please avoid driving on the site during this 20-minute period. If you do meet runners while driving your car, please STOP until they have all passed. Thank you for your cooperation. Details on the course, and how to register your team for the relay race, can be found at: https://espace.cern.ch/Running-Club/CERN-Relay Some advice for all runners from the medical service can also be found here: https://espace.cern.ch/Running-Club/CERN-Relay/RelayPagePictures/MedicalServiceAnnoncement.pdf

  17. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  18. Reliability Improved Cooperative Communication over Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhuangbin Chen

    2017-10-01

    Full Text Available With the development of smart devices and connection technologies, Wireless Sensor Networks (WSNs are becoming increasingly intelligent. New or special functions can be obtained by receiving new versions of program codes to upgrade their software systems, forming the so-called smart Internet of Things (IoT. Due to the lossy property of wireless channels, data collection in WSNs still suffers from a long delay, high energy consumption, and many retransmissions. Thanks to wireless software-defined networks (WSDNs, software in sensors can now be updated to help them transmit data cooperatively, thereby achieving more reliable communication. In this paper, a Reliability Improved Cooperative Communication (RICC data collection scheme is proposed to improve the reliability of random-network-coding-based cooperative communications in multi-hop relay WSNs without reducing the network lifetime. In WSNs, sensors in different positions can have different numbers of packets to handle, resulting in the unbalanced energy consumption of the network. In particular, nodes in non-hotspot areas have up to 90% of their original energy remaining when the network dies. To efficiently use the residual energy, in RICC, high data transmission power is adopted in non-hotspot areas to achieve a higher reliability at the cost of large energy consumption, and relatively low transmission power is adopted in hotspot areas to maintain the long network lifetime. Therefore, high reliability and a long network lifetime can be obtained simultaneously. The simulation results show that compared with other scheme, RICC can reduce the end-to-end Message Fail delivering Ratio (MFR by 59.4%–62.8% under the same lifetime with a more balanced energy utilization.

  19. Multiple Antennas Systems and Full Duplex Relay Systems with Hardware Impairments: New Performance Limits

    KAUST Repository

    Javed, Sidrah

    2016-12-01

    Next generation of wireless communication mostly relies on multiple-input multipleoutput (MIMO) configuration and full-duplex relaying to improve data-rates, spectrale efficiency, spatial-multiplexing, quality-of-service and energy-efficiency etc. However, multiple radio frequency (RF) transceivers in MIMO system and multi-hops in relay networks, accumulate transceiver impairments, rendering an unacceptable system performance. Majority of the technical contributions either assume ideal hardware or inappropriately model hardware impairments which often induce misleading results especially for high data-rate communication systems. We propose statistical mathematical modeling of various hardware impairment (HWI) to characterize their deteriorating effects on the information signal. In addition, we model the aggregate HWI as improper Gaussian signaling (IGS), to fully characterize their asymmetric properties and the self-interfering signal attribute under I/Q imbalance. The proposed model encourages to adopt asymmetric transmission scheme, as opposed to traditional symmetric signaling. First, we present statistical baseband equivalent mathematical models for general MIMO system and two special scenarios of receive and transmit diversity systems under HWI. Then, we express their achievable rate under PGS and IGS transmit schemes. Moreover, we tune the IGS statistical characteristics to maximize the achievable rate. We also present optimal beam-forming/pre-coding and receive combiner vector for multiple-input single-output (MISO) and single-input multiple output (SIMO) systems, which lead to SDNR maximization. Moreover, we propose an adaptive scheme to switch between maximal IGS (MIGS) and PGS transmission based on the described conditions to reduce computational overhead. Subsequently, two case studies are presented. 1) Outage analysis has been carried out for SIMO, under transceiver distortion noise, for two diversity combining schemes 2) The benefits of employing IGS

  20. The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

    Directory of Open Access Journals (Sweden)

    Y. Chen

    2013-08-01

    Full Text Available With the ever-increasing wireless data application recently, considerable efforts have been focused on the designof distributed explicit rate scheme based on Network Utility Maximization (NUM or wireless multi-hop meshnetworks. This paper describes a novel wireless multi-hop multicast flow control scheme for wireless meshnetworks via 802.11, which is based on the distributed self-turning Optimal Proportional plus Second-orderDifferential (OPSD controller. The control scheme, which is located at the sources in the wireless multicastnetworks, can ensure short convergence time by regulating the transmission rate. We further analyze thetheoretical aspects of the proposed algorithm. Simulation results demonstrate the efficiency of the proposedscheme in terms of fast response time, low packet loss and error ration.

  1. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  2. Distributed Antenna Channels with Regenerative Relaying: Relay Selection and Asymptotic Capacity

    Directory of Open Access Journals (Sweden)

    del Coso Aitor

    2007-01-01

    Full Text Available Multiple-input-multiple-output (MIMO techniques have been widely proposed as a means to improve capacity and reliability of wireless channels, and have become the most promising technology for next generation networks. However, their practical deployment in current wireless devices is severely affected by antenna correlation, which reduces their impact on performance. One approach to solve this limitation is relaying diversity. In relay channels, a set of wireless nodes aids a source-destination communication by relaying the source data, thus creating a distributed antenna array with uncorrelated path gains. In this paper, we study this multiple relay channel (MRC following a decode-and-forward (D&F strategy (i.e., regenerative forwarding, and derive its achievable rate under AWGN. A half-duplex constraint on relays is assumed, as well as distributed channel knowledge at both transmitter and receiver sides of the communication. For this channel, we obtain the optimum relay selection algorithm and the optimum power allocation within the network so that the transmission rate is maximized. Likewise, we bound the ergodic performance of the achievable rate and derive its asymptotic behavior in the number of relays. Results show that the achievable rate of regenerative MRC grows as the logarithm of the Lambert W function of the total number of relays, that is, . Therefore, D&F relaying, cannot achieve the capacity of actual MISO channels.

  3. Distributed Antenna Channels with Regenerative Relaying: Relay Selection and Asymptotic Capacity

    Directory of Open Access Journals (Sweden)

    Aitor del Coso

    2007-11-01

    Full Text Available Multiple-input-multiple-output (MIMO techniques have been widely proposed as a means to improve capacity and reliability of wireless channels, and have become the most promising technology for next generation networks. However, their practical deployment in current wireless devices is severely affected by antenna correlation, which reduces their impact on performance. One approach to solve this limitation is relaying diversity. In relay channels, a set of N wireless nodes aids a source-destination communication by relaying the source data, thus creating a distributed antenna array with uncorrelated path gains. In this paper, we study this multiple relay channel (MRC following a decode-and-forward (D&F strategy (i.e., regenerative forwarding, and derive its achievable rate under AWGN. A half-duplex constraint on relays is assumed, as well as distributed channel knowledge at both transmitter and receiver sides of the communication. For this channel, we obtain the optimum relay selection algorithm and the optimum power allocation within the network so that the transmission rate is maximized. Likewise, we bound the ergodic performance of the achievable rate and derive its asymptotic behavior in the number of relays. Results show that the achievable rate of regenerative MRC grows as the logarithm of the Lambert W function of the total number of relays, that is, 𝒞=log⁡2(W0(N. Therefore, D&F relaying, cannot achieve the capacity of actual MISO channels.

  4. Network Coding for Hop-by-Hop Communication Enhancement in Multi-hop Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Khamfroush, Hana; Roetter, Daniel Enrique Lucani

    2016-01-01

    In our recent study, we introduced the PlayNCool protocol that increases the throughput of the wireless networks by enabling a helper node to strengthen the communication link between two neighboring nodes and using random linear network coding. This paper focuses on design and implementation...... using Aalborg University's Raspberry Pi test-bed. Our results show that selecting the best policy to activate the helper node is a key to guarantee the performance of PlayNCool protocol. We also study the effect of neighbor nodes in the performance of PlayNCool. Using a helper in presence of active...... neighbors is useful even if the channel from helper to destination is not better than the channel between sender and destination. PlayNCool increases the gain of end-to-end communication by two-fold or more while maintaining compatibility to standard wireless ad-hoc routing protocols....

  5. Rate regions for coordination of Decode-and-Forward relays and direct users

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar

    2012-01-01

    Recently, the ideas of wireless network coding (NC) has significantly enriched the area of wireless cooperation/relaying. They bring substantial gains in spectral efficiency mainly in scenarios with two–way relaying. Inspired by the ideas of wireless NC, recently we have proposed techniques for c...

  6. Physical Layer Security Using Two-Path Successive Relaying

    Directory of Open Access Journals (Sweden)

    Qian Yu Liau

    2016-06-01

    Full Text Available Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  7. Physical Layer Security Using Two-Path Successive Relaying.

    Science.gov (United States)

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-06-09

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  8. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.

    2015-08-12

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost packets of devices in their transmission range by sending network coded packets. To solve the problem, the different events occurring at each device are identified so as to derive an expression for the probability distribution of the decoding delay. The joint optimization problem over the set of transmitting devices and the packet combinations of each is formulated. Due to the high complexity of finding the optimal solution, this paper focuses on cooperation without interference between the transmitting users. The optimal solution, in such interference-less scenario, is expressed using a graph theory approach by introducing the cooperation graph. Extensive simulations compare the decoding delay experienced in the Point to Multi-Point (PMP), the fully connected D2D (FC-D2D) and the more practical partially connected D2D (PC-D2D) configurations and suggest that the PC-D2D outperforms the FC-D2D in all situations and provides an enormous gain for poorly connected networks.

  9. Event Localization in Underwater Wireless Sensor Networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew

    2011-11-01

    In this thesis we consider different methods to localize events in a multi-hop wireless sensor network operating underwater using acoustic modems. The network consists of surface gateway nodes and relay nodes. Localization of surface gateways can be achieved through GPS, but we cannot rely on this technology for localizing underwater nodes. Surface Gateway nodes can distribute their locations through the network using the incoming signals by the acoustic modems from the relay nodes. Relay nodes are deployed to remain static but due to water currents, floating, and the untethered nature of the nodes, they often suffer from frequent drifting which can result in a deployed network suffering link failures. In this work, we developed a novel concept of an underwater alarming system, which adapts a cyclic graph model. In the event of link failure, a series of alarm packets are broadcasted in the network. These alarms are then captured through a novel concept of underwater Monitoring Courses (M-Courses), which can also be used to assure network connectivity and identify node faults. M-Courses also allow the network to localize events and identify network issues at a local level before forwarding any results upwards to a Surface Gateway nodes. This reduces the amount of communication overhead needed and allowing for distributed management of nodes in a network which may be constantly moving. We show that the proposed algorithms can reduce the number of send operations needed for an event to be localized in a network. We have found that M-Course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% in some cases when compared to a naive routing implementation. But this is achieved by increasing the time for an event to reach a Surface Gateway. These effects are both due to the buffering effect of M-Course routing, which allows us to efficiently deal with multiple events in an local area and we find that the performance of M

  10. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad

    2014-04-06

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat\\') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  11. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities.

    Science.gov (United States)

    Bellavista, Paolo; Giannelli, Carlo; Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro

    2017-11-03

    The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.

  12. On the Performance of Millimeter Wave-based RF-FSO Multi-hop and Mesh Networks

    KAUST Repository

    Makki, Behrooz

    2017-09-22

    This paper studies the performance of multi-hop and mesh networks composed of millimeter wave-based radio frequency (RF) and free-space optical (FSO) links. The results are obtained in cases with and without hybrid automatic repeat request (HARQ). Using the central limit theorem as well as other state-of-the-art approximation schemes, we derive closed-form expressions for the networks’ outage probability and ergodic achievable rates. We also evaluate the effect of various parameters such as power amplifiers efficiency, number of antennas as well as different coherence times of the RF and the FSO links on the system performance. Finally, we determine the minimum number of the transmit antennas in the RF link such that the same rate is supported in the RF- and the FSO-based hops. The results show the efficiency of the RF-FSO setups in different conditions. Moreover, HARQ can effectively improve the outage probability/energy efficiency, and compensate for the effect of hardware impairments in RF-FSO networks. For common parameter settings of the RF-FSO dual-hop networks, outage probability of 10−4 and code rate of 3 nats-per-channel-use, the implementation of HARQ with a maximum of 2 and 3 retransmissions reduces the required power, compared to cases with open-loop communication, by 13 and 17 dB, respectively.

  13. Robust Tomlinson-Harashima precoding for non-regenerative multi-antenna relaying systems

    KAUST Repository

    Xing, Chengwen

    2012-04-01

    In this paper, we consider the robust transceiver design with Tomlinson-Harashima precoding (THP) for multi-hop amplify-and-forward (AF) multiple-input multiple-output (MIMO) relaying systems. THP is adopted at the source to mitigate the spatial inter-symbol interference and then a joint Bayesian robust design of THP at source, linear forwarding matrices at relays and linear equalizer at destination is proposed. Based on the elegant characteristics of multiplicative convexity and matrix-monotone functions, the optimal structure of the nonlinear transceiver is first derived. Based on the derived structure, the optimization problem is greatly simplified and can be efficiently solved. Finally, the performance advantage of the proposed robust design is assessed by simulation results. © 2012 IEEE.

  14. Robust Transceiver with Tomlinson-Harashima Precoding for Amplify-and-Forward MIMO Relaying Systems

    KAUST Repository

    Xing, Chengwen

    2012-09-01

    In this paper, robust transceiver design with Tomlinson-Harashima precoding (THP) for multi-hop amplifyand-forward (AF) multiple-input multiple-output (MIMO) relaying systems is investigated. At source node, THP is adopted to mitigate the spatial intersymbol interference. However, due to its nonlinear nature, THP is very sensitive to channel estimationerrors. In order to reduce the effects of channel estimation errors, a joint Bayesian robust design of THP at source, linear forwarding matrices at relays and linear equalizer at destination is proposed. With novel applications of elegant characteristics of multiplicative convexity and matrix-monotone functions, the optimal structure of the nonlinear transceiver is first derived. Based on the derived structure, the transceiver design problem reduces to a much simpler one with only scalar variables which can be efficiently solved. Finally, the performance advantage of the proposed robust design over non-robust design is demonstrated by simulation results.

  15. Coordinated Direct and Relay Transmission with Linear Non-Regenerative Relay Beamforming

    DEFF Research Database (Denmark)

    Sun, Fan; De Carvalho, Elisabeth; Popovski, Petar

    2012-01-01

    Joint processing of multiple communication flows in wireless systems has given rise to a number of novel transmission techniques, notably the two-way relaying, but also more general traffic scenarios, such as coordinated direct and relay (CDR) transmissions. In a CDR scheme the relay has a central...... role in managing the interference and boosting the overall system performance. In this letter we consider the case in which an amplify-and-forward relay has multiple antennas and can use beamforming to support the coordinated transmissions. We focus on one representative traffic type with one uplink...... user and one downlink user. Two different criteria for relay beamforming are analyzed: maximal weighted sum-rate and maximization of the worst-case weighted SNR. We propose iterative optimal solutions, as well as low-complexity near-optimal solutions....

  16. Relay race

    CERN Multimedia

    Staff Association

    2012-01-01

    The CERN Relay Race will take place around the Meyrin site on Thursday 24th May at 12:00. This annual event is for teams of six runners covering distances of 1000 m, 800 m, 800 m, 500 m, 500 m and 300 m respectively. Teams may be entered in the Seniors, Veterans, Ladies, Mixed or Open categories. There will also this year be a Nordic Walking event, as part of the Medical Service’s initiative “Move more, eat better!” The registration fee is 10 CHF per runner, and each runner will receive a souvenir prize. There will be a programme of entertainment from 12:00 on the arrival area (the lawn in front of Restaurant 1): 12:00 - 12:45  Music from the Old Bottom Street band 12:15 Start of the race 12:45 - 13h Demonstrations by the Fitness club and Dancing club 13:00 Results and prize giving (including a raffle to win an iPad2 3G offered by the Micro club) 13:20 à 14:00 Music from “What’s next” And many information st...

  17. Sum-Rate Maximization of Coordinated Direct and Relay Systems

    DEFF Research Database (Denmark)

    Sun, Fan; Popovski, Petar; Thai, Chan

    2012-01-01

    Joint processing of multiple communication flows in wireless systems has given rise to a number of novel transmission techniques, notably the two-way relaying based on wireless network coding. Recently, a related set of techniques has emerged, termed coordinated direct and relay (CDR) transmissions......, where the constellation of traffic flows is more general than the two-way. Regardless of the actual traffic flows, in a CDR scheme the relay has a central role in managing the interference and boosting the overall system performance. In this paper we investigate the novel transmission modes, based...... on amplify-and-forward, that arise when the relay is equipped with multiple antennas and can use beamforming. We focus on one representative traffic type, with one uplink and one downlink users and consider the achievable sum-rate maximization relay beamforming. The beamforming criterion leads to a non...

  18. A Fast and Scalable Algorithm for Calculating the Achievable Capacity of a Wireless Mesh Network

    Science.gov (United States)

    2016-05-09

    J. Welsh and M. B. Powell, “An upper bound for the chromatic number of a graph and its application to timetabling problems ,” The Computer Journal... problem of rapidly deter- mining the maximum achievable capacity of a multi-hop wireless mesh network subject to interference constraints. Being able to...deployed networks. The joint routing and scheduling problem for a given set of demands is an NP-Hard cross-layer optimization problem [4], and just finding

  19. Range based power control for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2009-08-01

    Full Text Available control methods exist for the Range Based Power Control for Multi-Radio Multi- Channel Wireless Mesh Networks Thomas O. Olwal, Barend J. Van Wyk, Karim Djouani, Yskandar Hamam, Patrick Siarry and Ntsibane Ntlatlapa Department of French South African... in Multi-Radio Wireless Mesh Networks,” in Proc. Infocom’ 2006. [8] J. Gomez and A. T. Campbell, “A Case for Variable-Range Transmission Power Control in Wireless Multi-hop Networks,” in Proc. IEEE INFOCOM 2004. [9] M. Neely, E. Modiano and C. E...

  20. Efficient Relay Selection Scheme for Delay-Limited Non-Orthogonal Hybrid-ARQ Relay Channels

    CERN Document Server

    Maham, Behrouz; Debbah, Merouane

    2012-01-01

    We consider a half-duplex wireless relay network with hybrid-automatic retransmission request (HARQ) and Rayleigh fading channels. In this paper, we analyze the outage probability of the multi-relay delay-limited HARQ system with opportunistic relaying scheme in decode-and-forward mode, in which the \\emph{best} relay is selected to transmit the source's regenerated signal. A simple and distributed relay selection strategy is proposed for multi-relay HARQ channels. Then, we utilize the non-orthogonal cooperative transmission between the source and selected relay for retransmitting of the source data toward the destination if needed, using space-time codes or beamforming techniques. We analyze the performance of the system. We first derive the cumulative density function (CDF) and probability density function (PDF) of the selected relay HARQ channels. Then, the CDF and PDF are used to determine the outage probability in the $l$-th round of HARQ. The outage probability is required to compute the throughput-delay...

  1. Cognitive Relay Networks: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Ayesha Naeem

    2015-07-01

    Full Text Available Cognitive radio is an emerging technology to deal with the scarcity and requirement of radio spectrum by dynamically assigning spectrum to unlicensed user . This revolutionary technology shifts the paradigm in the wireless system design by all owing unlicensed user the ability to sense, adapt and share the dynamic spectrum. Cognitive radio technology have been applied to different networks and applications ranging from wireless to public saf ety, smart grid, medical, rela y and cellular applications to increase the throughput and spectrum efficiency of the network. Among these applications, cognitive relay networks is one of the application where cognitive radio technology has been applied. Cognitiv e rela y network increases the network throughput by reducing the complete pa th loss and also by ensuring cooper ation among secondary users and cooperation among primary and secondary users. In this paper , our aim is to provide a survey on cognitive relay network. We also provide a detailed review on existing schemes in cognitive relay networks on the basis of relaying protocol, relay cooperation and channel model.

  2. On Cooperative Relay in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Donglin Hu

    2013-12-01

    Full Text Available Cognitive radios (CR and cooperative communications represent new paradigms that both can effectively improve the spectrum efficiency of future wireless networks. In this paper, we investigate the problem of cooperative relay in CR networks for further enhanced network performance. We investigate how to effectively integrate these two advanced wireless communications technologies. In particular, we focus on the two representative cooperative relay strategies, decode-and-forward (DF and amplify-and-forward (AF, and develop optimal spectrum sensing and p-Persistent CSMA for spectrum access.We develop an analysis for the comparison of these two relay strategies in the context of CR networks, and derive closed-form expressions for network-wide throughput achieved by DF, AF and direct link transmissions. Our analysis is validated by simulations. We find each of the strategies performs better in a certain parameter range; there is no case of dominance for the two strategies. The significant gaps between the cooperative relay results and the direct link results exemplify the diversity gain achieved by cooperative relays in CR networks.

  3. Scheduling and congestion control for wireless internet

    CERN Document Server

    Wang, Xin

    2014-01-01

    This brief proposes that the keys to internet cross-layer optimization are the development of non-standard implicit primal-dual solvers for underlying optimization problems, and design of jointly optimal network protocols as decomposition of such solvers. Relying on this novel design-space oriented approach, the author develops joint TCP congestion control and wireless-link scheduling schemes for wireless applications over Internet with centralized and distributed (multi-hop) wireless links. Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployed with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.

  4. Relay in translation

    OpenAIRE

    Cay Dollerup

    2008-01-01

    This article focuses on the phenomenon of relay in translation. Relay is by nature difficult to discuss and therefore it is no surprise that even scholars who know of its existence usually do so only in passing. Scholars unaware of relay occasionally come across a relayed translation (namely a translation using a first translation from the language of the original as a relay). When they do so in comparative studies, they tend to consider the relayed rendition as either a poor or heavily manip...

  5. Generalized instantly decodable network coding for relay-assisted networks

    KAUST Repository

    Elmahdy, Adel M.

    2013-09-01

    In this paper, we investigate the problem of minimizing the frame completion delay for Instantly Decodable Network Coding (IDNC) in relay-assisted wireless multicast networks. We first propose a packet recovery algorithm in the single relay topology which employs generalized IDNC instead of strict IDNC previously proposed in the literature for the same relay-assisted topology. This use of generalized IDNC is supported by showing that it is a super-set of the strict IDNC scheme, and thus can generate coding combinations that are at least as efficient as strict IDNC in reducing the average completion delay. We then extend our study to the multiple relay topology and propose a joint generalized IDNC and relay selection algorithm. This proposed algorithm benefits from the reception diversity of the multiple relays to further reduce the average completion delay in the network. Simulation results show that our proposed solutions achieve much better performance compared to previous solutions in the literature. © 2013 IEEE.

  6. Efficient incremental relaying

    KAUST Repository

    Fareed, Muhammad Mehboob

    2013-07-01

    We propose a novel relaying scheme which improves the spectral efficiency of cooperative diversity systems by utilizing limited feedback from destination. Our scheme capitalizes on the fact that relaying is only required when direct transmission suffers deep fading. We calculate the packet error rate for the proposed efficient incremental relaying scheme with both amplify and forward and decode and forward relaying. Numerical results are also presented to verify their analytical counterparts. © 2013 IEEE.

  7. 80537 based distance relay

    DEFF Research Database (Denmark)

    Pedersen, Knud Ole Helgesen

    1999-01-01

    A method for implementing a digital distance relay in the power system is described.Instructions are given on how to program this relay on a 80537 based microcomputer system.The problem is used as a practical case study in the course 53113: Micocomputer applications in the power system.The relay...

  8. Performance study of terrestrial multi-hop OFDM FSO communication systems with pointing errors over turbulence channels

    Science.gov (United States)

    Nistazakis, H. E.; Ninos, M. P.; Tsigopoulos, A. D.; Zervos, D. A.; Tombras, G. S.

    2016-08-01

    The free-space optical communication systems attract significant research and commercial interest the last few years, due to their high performance and reliability characteristics along with their, relatively, low installation and operational cost. Moreover, due to the fact that these systems are using the atmosphere as propagation path, their performance is varying according to its characteristics. Here, we present the performance analysis of a serially relayed radio-on-free-space-optical (RoFSO) communication system which employs the orthogonal frequency division multiplexing technique, with a quadrature amplitude modulation scheme, over atmospheric turbulence channels modelled by either the Gamma-Gamma or the Gamma distribution model. For this RoFSO communication link, we derive closed-form mathematical expressions for the estimation of its average bit error rate and outage probability, taking into account the relays' number, the atmospheric turbulence and the pointing errors effect. Furthermore, for realistic parameter values, numerical results are presented using the derived mathematical expressions, which are verified through the corresponding numerical simulations.

  9. Multiple Attribute Decision Making Based Relay Vehicle Selection for Electric Vehicle Communication

    Directory of Open Access Journals (Sweden)

    Zhao Qiang

    2015-01-01

    Full Text Available Large-scale electric vehicle integration into power grid and charging randomly will cause serious impacts on the normal operation of power grid. Therefore, it is necessary to control the charging behavior of electric vehicle, while information transmission for electric vehicle is significant. Due to the highly mobile characteristics of vehicle, transferring information to power grid directly might be inaccessible. Relay vehicle (RV can be used for supporting multi-hop connection between SV and power grid. This paper proposes a multiple attribute decision making (MADM-based RV selection algorithm, which considers multiple attribute, including data transfer rate, delay, route duration. It takes the characteristics of electric vehicle communication into account, which can provide protection for the communication services of electric vehicle charging and discharging. Numerical results demonstrate that compared to previous algorithm, the proposed algorithm offer better performance in terms of throughput, transmission delay.

  10. Use of Behavior and Influence Functions for Relay Selection in Cooperative Communications

    DEFF Research Database (Denmark)

    Craciunescu, Razvan; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2015-01-01

    This paper uses a novel set of functions to model the relay selection process in a scenario of cooperative wireless communications. We define a utility function that reflects the behavior and influence that a selected relay may have on the quality of the link to be established for the forwarding...... of data. The utility function takes into account also the strategies of other players. To this end, we define a relay selection game and a supporting Nash Equilibrium (NE) algorithm for the choice of a relay during communication. The successful selection of a relay is evaluated by simulations in terms...

  11. PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

    Directory of Open Access Journals (Sweden)

    Vaibhav Kumar Gupta

    2014-06-01

    Full Text Available The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS techniques. Unfortunately, they can be made less effective if source- eavesdropper wiretap channel is better than the main source-receiver channel. The various node cooperation schemes can be employed to combat this limitation where a relay node assists the communication to improve the performance significantly. In this paper, a four node wireless communication system consisting of a source, a destination, a relay and an eavesdropper as wire-tapper has been considered. The performance of the traditional cooperation schemes in terms of secrecy rate has been investigated with a different scenario where relay node helps the eavesdropper to deteriorate the secrecy rate. In addition, since legitimate receiver can overhear the transmission of relay, it favours the achievable secrecy rate. We formulate an analytical expression of conditional secrecy outage probability for the investigated system. From the obtained simulation results, it has been observed that secrecy rate is monotonically increases with path loss index. Furthermore, the proper selection of the system parameters leads to enhance the secrecy performance of the system even if relay pertains to degrade the performance. Amplify-and-forward, cooperation, decode-and-Forward, secrecy rate, relay.

  12. Decentralized control of transmission rates in energy-critical wireless networks

    KAUST Repository

    Xia, Li

    2013-06-01

    In this paper, we discuss the decentralized optimization of delay and energy consumption in a multi-hop wireless network. The goal is to minimize the energy consumption of energy-critical nodes and the overall packet transmission delay of the network. The transmission rates of energy-critical nodes are adjustable according to the local information of nodes, i.e., the length of packets queued. The multi-hop network is modeled as a queueing network.We prove that the system performance is monotone w.r.t. (with respect to) the transmission rate, thus the “bang-bang” control is an optimal control. We also prove that there exists a threshold type control policy which is optimal. We propose a decentralized algorithm to control transmission rates of these energy-critical nodes. Some simulation experiments are conducted to demonstrate the effectiveness of our approach.

  13. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.

    2010-11-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine the location of the source using the direct and the relayed signal at the destination. We derive the Cramer-Rao lower bound (CRLB) expressions separately for x and y coordinates of the location estimate. We analyze the effects of cognitive behaviour of the relay on the performance of the proposed method. We also discuss and quantify the reliability of the location estimate using the proposed technique if the source is not stationary. The overall performance of the proposed method is presented through simulations. ©2010 IEEE.

  14. Relay in translation

    Directory of Open Access Journals (Sweden)

    Cay Dollerup

    2008-01-01

    Full Text Available This article focuses on the phenomenon of relay in translation. Relay is by nature difficult to discuss and therefore it is no surprise that even scholars who know of its existence usually do so only in passing. Scholars unaware of relay occasionally come across a relayed translation (namely a translation using a first translation from the language of the original as a relay. When they do so in comparative studies, they tend to consider the relayed rendition as either a poor or heavily manipulated translation. Historically, relay has been an important factor in translational activity. It is obscured by e.g. the delay in the spread of ‘international fame’ of prominent writers in the past as well as the fact that not all translators and publishers informed audiences that the translation they published was based on a translation from another language than that of the original text. The article attempts to differentiate ‘relayed translations’ from other types of non-direct translation. It discusses their occurrence in translation, interpreting, and subtitling, and ends with a few comments on how relay can(not be tackled in practical translation work.

  15. Power Allocation and Pricing in Multi-User Relay Networks Using Stackelberg and Bargaining Games

    CERN Document Server

    Cao, Qian; Jing, Yindi

    2012-01-01

    This paper considers a multi-user single-relay wireless network, where the relay gets paid for helping the users forward signals, and the users pay to receive the relay service. We study the relay power allocation and pricing problems, and model the interaction between the users and the relay as a two-level Stackelberg game. In this game, the relay, modeled as the service provider and the leader of the game, sets the relay price to maximize its revenue; while the users are modeled as customers and the followers who buy power from the relay for higher transmission rates. We use a bargaining game to model the negotiation among users to achieve a fair allocation of the relay power. Based on the proposed fair relay power allocation rule, the optimal relay power price that maximizes the relay revenue is derived analytically. Simulation shows that the proposed power allocation scheme achieves higher network sum-rate and relay revenue than the even power allocation. Furthermore, compared with the sum-rate-optimal so...

  16. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities

    Directory of Open Access Journals (Sweden)

    Paolo Bellavista

    2017-11-01

    Full Text Available The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA, a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.

  17. A Novel Design of Radio Frequency Energy Relays on Power Transmission Lines

    OpenAIRE

    Jin Tong; Yigang He; Bing Li; Fangming Deng; Tao Wang

    2016-01-01

    In this paper, we investigate the energy problem of monitoring sensors on high-voltage power transmission lines and propose a wireless charging scheme for a Radio Frequency IDentification (RFID) sensor tag to solve a commercial efficiency problem: the maintenance-caused power outage. Considering the environmental influences on power transmission lines, a self-powered wireless energy relay is designed to meet the energy requirement of the passive RFID sensor tag. The relay can obtain the elect...

  18. Message Collision Avoidance Protocols for Detecting Stray Nodes in a Scuba Diving Group Using Ultrasonic Multi-Hop Message Communication

    Directory of Open Access Journals (Sweden)

    Shinya Kaido

    2017-12-01

    Full Text Available Recent years have seen a growing interest in underwater communication and some progress has been made in this area. However, underwater communication is still immature compared with terrestrial communication. A prime reason for this is that the underwater environment is intrinsically not suitable for propagation of electric waves. Instead, ultrasonic waves are mainly used for underwater communication. Since ultrasonic waves cannot provide sufficient communication speed or capacity, they cannot use existing network technologies, which assume use of radio waves. In particular, communication in shallow water is still an uncharted territory. Few communication technologies are employed in environments where people enjoy scuba diving. This paper addresses problems faced by recreational scuba divers. It proposes constructing an ad hoc mesh-shaped network between divers within a group and use ultrasonic waves as transmission media in order to enable the detection of a stray diver. It also proposes a communication protocol in which messages are relayed in multiple hops, and a message collision avoidance method, which is intended to reduce the rate of packet loss caused by message propagation delay. We have implemented the proposed methods in a network simulator, and compared them with an existing communication method that has no message collision avoidance function, in terms of the packet loss rate, the stray driver detection rate, and the rate of the ability to communicate in multiple hops.

  19. Wireless Sensor Networks for Environmental Monitoring

    Science.gov (United States)

    Liang, X.; Liang, Y.; Navarro, M.; Zhong, X.; Villalba, G.; Li, Y.; Davis, T.; Erratt, N.

    2015-12-01

    Wireless sensor networks (WSNs) have gained an increasing interest in a broad range of new scientific research and applications. WSN technologies can provide high resolution for spatial and temporal data which has not been possible before, opening up new opportunities. On the other hand, WSNs, particularly outdoor WSNs in harsh environments, present great challenges for scientists and engineers in terms of the network design, deployment, operation, management, and maintenance. Since 2010, we have been working on the deployment of an outdoor multi-hop WSN testbed for hydrological/environmental monitoring in a forested hill-sloped region at the Audubon Society of Western Pennsylvania (ASWP), Pennsylvania, USA. The ASWP WSN testbed has continuously evolved and had more than 80 nodes by now. To our knowledge, the ASWP WSN testbed represents one of the first known long-term multi-hop WSN deployments in an outdoor environment. As simulation and laboratory methods are unable to capture the complexity of outdoor environments (e.g., forests, oceans, mountains, or glaciers), which significantly affect WSN operations and maintenance, experimental deployments are essential to investigate and understand WSN behaviors and performances as well as its maintenance characteristics under these harsh conditions. In this talk, based on our empirical studies with the ASWP WSN testbed, we will present our discoveries and investigations on several important aspects including WSN energy profile, node reprogramming, network management system, and testbed maintenance. We will then provide our insight into these critical aspects of outdoor WSN deployments and operations.

  20. Appendices for: Improper Signaling in Two-Path Relay Channels

    KAUST Repository

    Gaafar, Mohamed

    2016-12-01

    This document contains the appendices for the work in “Improper Signaling in Two-Path Relay Channels,” which is submitted to 2017 IEEE International Conference on Communications (ICC) Workshop on Full-Duplex Communications for Future Wireless Networks, Paris, France.

  1. Power system relaying

    CERN Document Server

    Horowitz, Stanley H; Niemira, James K

    2013-01-01

    The previous three editions of Power System Relaying offer comprehensive and accessible coverage of the theory and fundamentals of relaying and have been widely adopted on university and industry courses worldwide. With the third edition, the authors have added new and detailed descriptions of power system phenomena such as stability, system-wide protection concepts and discussion of historic outages. Power System Relaying, 4th Edition continues its role as an outstanding textbook on power system protection for senior and graduate students in the field of electric power engineering and a refer

  2. Asymmetric Modulation Gains in Network Coded Relay Networks

    DEFF Research Database (Denmark)

    Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2015-01-01

    to enhance data transmission of groups of data packets, generally using some packet-level coding approach. Network coding's recoding capabilities at intermediate nodes make it particularly suitable for the later. This paper's idea falls in between these two research lines. We aim to increase the end......Wireless relays have usually been considered in two ways. On the one hand, a physical layer approach focused on per-packet reliability and involving the relay on each packet transmission. On the other, recent approaches have relied on the judicious activation of the relay at the network level......–to–end throughput by (i) using network coding to control the use of the relay in an effective manner, and (ii) leveraging asymmetric modulation to enable the source to efficiently allocate its resources. We provide mathematical analysis and a simple optimization mechanism. Numerical results for the case of fading...

  3. Ready, steady… relay!

    CERN Multimedia

    2008-01-01

    Thursday 5 June. With another year comes another success for CERN’s Relay Race. With 76 teams taking part it was the second highest turnout in the race’s history. ‘The Shabbys’ won the relay race in 10 minutes 51 seconds.As popular as ever, this year the relay race took on the atmosphere of a mini carnival. Gathering on the lawn outside Restaurant 1, various stalls and attractions added to the party feeling of the event, with beer courtesy of ‘AGLUP’, the Belgian beer club, and a wandering jazz group entertaining spectators and competitors alike. Reflecting the greater involvement of other associations in the relay race, the president of the Staff Association Clubs Committee, James Purvis, was the guest of honour, launching the start of the race and presenting the prizes. As regular followers of the race could have probably predicted, The Shabbys were once again victorious and claimed first place. The team members th...

  4. Torch Relay Route Unveiled

    National Research Council Canada - National Science Library

    Li Li

    2007-01-01

      Beijing Olympics organizers have announced an ambitious torch relay plan for the 2008 Games which will see the sacred flame reach the world's highest peak and travel through 135 cities around the world...

  5. A Novel Design of Radio Frequency Energy Relays on Power Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jin Tong

    2016-06-01

    Full Text Available In this paper, we investigate the energy problem of monitoring sensors on high-voltage power transmission lines and propose a wireless charging scheme for a Radio Frequency IDentification (RFID sensor tag to solve a commercial efficiency problem: the maintenance-caused power outage. Considering the environmental influences on power transmission lines, a self-powered wireless energy relay is designed to meet the energy requirement of the passive RFID sensor tag. The relay can obtain the electric field energy from the transmission lines and wirelessly power the RFID sensor tags around for longer operating distance. A prototype of the energy relay is built and tested on a 110 kv line. The measurement results show that the energy relay can provide stable energy even with the influences of wind, noise and power outage. To our knowledge, it is the first work to power the RFID sensor tags on power transmission lines.

  6. Opportunistic relaying in multipath and slow fading channel: Relay selection and optimal relay selection period

    KAUST Repository

    Sungjoon Park,

    2011-11-01

    In this paper we present opportunistic relay communication strategies of decode and forward relaying. The channel that we are considering includes pathloss, shadowing, and fast fading effects. We find a simple outage probability formula for opportunistic relaying in the channel, and validate the results by comparing it with the exact outage probability. Also, we suggest a new relay selection algorithm that incorporates shadowing. We consider a protocol of broadcasting the channel gain of the previously selected relay. This saves resources in slow fading channel by reducing collisions in relay selection. We further investigate the optimal relay selection period to maximize the throughput while avoiding selection overhead. © 2011 IEEE.

  7. Alternate MIMO relaying with three AF relays using interference alignment

    KAUST Repository

    Park, Kihong

    2012-06-01

    In this paper, we study a two-hop half-duplex relaying network with one source, one destination, and three amplify-and-forward (AF) relays equipped with M antennas each. We consider alternate transmission to compensate for the inherent loss of capacity pre-log factor 1/2 in half duplex mode, where source transmit message to two relays and the other relay alternately. The inter-relay interference caused by alternate transmission is aligned to make additional degrees of freedom (DOFs). It is shown that the proposed scheme enables us to exploit 3M/4 DOFs compared with the M/2 DOFs of conventional AF relaying. More specifically, suboptimal linear filter designs for a source and three relays are proposed to maximize the achievable sum-rate. We verify using some selected numerical results that the proposed filter designs give significant improvement of the sum-rate over a naive filter and conventional relaying schemes. © 2012 IEEE.

  8. Half-Duplex and Full-Duplex AF and DF Relaying with Energy-Harvesting in Log-Normal Fading

    KAUST Repository

    Rabie, Khaled M.

    2017-08-15

    Energy-harvesting (EH) and wireless power transfer in cooperative relaying networks have recently attracted a considerable amount of research attention. Most of the existing work on this topic however focuses on Rayleigh fading channels, which represent outdoor environments. In contrast, this paper is dedicated to analyze the performance of dual-hop relaying systems with EH over indoor channels characterized by log-normal fading. Both half-duplex (HD) and full-duplex (FD) relaying mechanisms are studied in this work with decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols. In addition, three EH schemes are investigated, namely, time switching relaying, power splitting relaying and ideal relaying receiver which serves as a lower bound. The system performance is evaluated in terms of the ergodic outage probability for which we derive accurate analytical expressions. Monte Carlo simulations are provided throughout to validate the accuracy of our analysis. Results reveal that, in both HD and FD scenarios, AF relaying performs only slightly worse than DF relaying which can make the former a more efficient solution when the processing energy cost at the DF relay is taken into account. It is also shown that FD relaying systems can generally outperform HD relaying schemes as long as the loop-back interference in FD is relatively small. Furthermore, increasing the variance of the log-normal channel has shown to deteriorate the performance in all the relaying and EH protocols considered.

  9. Cooperative MIMO technology in multiple hops wireless sensor networks

    Science.gov (United States)

    Yuan, Lina; Chen, Huajun; Gong, Jing

    2017-03-01

    The limited lifetime is one of the important factors restricted wireless sensor networks (WSNs), when possible, wireless nodes often operate with small batteries, while battery replacement is a very difficult and expensive. So the nodes must work long hours in the case of no battery replacement. Therefore, in WSNs, minimizing energy consumption is an important design consideration, at the same time, the transmission strategies of energy efficiency must be used for data forwarding. This paper, using cooperative multiple input multiple output(MIMO) technology combined with multiple hops technology, has put forward a new transmission model, i.e., the MIMO-MISO(multi-input multi-output)/MIMO-MIMO model. Simulation results demonstrate the proposed MIMO-MISO/MIMO-MIMO to minimize energy consumption of each node every node for multi-hop WSNs, to save a great deal of energy for a larger transmission distance, which makes the life of the entire network be extended.

  10. REAL TIME WIRELESS AIR POLLUTION MONITORING SYSTEM

    Directory of Open Access Journals (Sweden)

    Raja Vara Prasad Y

    2011-06-01

    Full Text Available Air pollution has significant influence on the concentration of constituents in the atmosphere leading to effects like global warming and acid rains. To avoid such adverse imbalances in the nature, an air pollution monitoring system is utmost important. This paper attempts to develop an effective solution for pollution monitoring using wireless sensor networks (WSN on a real time basis namely real time wireless air pollution monitoring system. Commercially available discrete gas sensors for sensing concentration of gases like CO2, NO2, CO and O2 are calibrated using appropriate calibration technologies. These pre-calibrated gas sensors are then integrated with the wireless sensor motes for field deployment at the campus and the Hyderabad city using multi hop data aggregation algorithm. A light weight middleware and a web interface to view the live pollution data in the form of numbers and charts from the test beds was developed and made available from anywhere on the internet. Other parameters like temperature and humidity were also sensed along with gas concentrations to enable data analysis through data fusion techniques. Experimentation carried out using the developed wireless air pollution monitoring system under different physical conditions show that the system collects reliable source of real time fine-grain pollution data.

  11. CERN Relay Race

    CERN Multimedia

    2011-01-01

    The CERN relay race will take place around the Meyrin site on Thursday 19 May starting at 12-15. If possible, please avoid driving on the site during this 20-minute period. If you do meet runners while driving your car, please STOP until they have all passed. Thank you for your cooperation. Details of the course and of how to register your team for the relay race can be found here. Some advice for all runners from the Medical Service can also be found here.   

  12. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    our protocol is that each helper to a link in a multi-hop path reinforces that link by listening to coded packets transmitted in the link and by judiciously choosing when to start transmitting to make the data exchange faster and more efficient. This paper pays special attention to techniques......This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii...

  13. A topology reorganization scheme for reliable communication in underwater wireless sensor networks affected by shadow zones.

    Science.gov (United States)

    Domingo, Mari Carmen

    2009-01-01

    Effective solutions should be devised to handle the effects of shadow zones in Underwater Wireless Sensor Networks (UWSNs). An adaptive topology reorganization scheme that maintains connectivity in multi-hop UWSNs affected by shadow zones has been developed in the context of two Spanish-funded research projects. A mathematical model has been proposed to find the optimal location for sensors with two objectives: the minimization of the transmission loss and the maintenance of network connectivity. The theoretical analysis and the numerical evaluations reveal that our scheme reduces the transmission loss under all propagation phenomena scenarios for all water depths in UWSNs and improves the signal-to-noise ratio.

  14. A Topology Reorganization Scheme for Reliable Communication in Underwater Wireless Sensor Networks Affected by Shadow Zones

    Directory of Open Access Journals (Sweden)

    Mari Carmen Domingo

    2009-10-01

    Full Text Available Effective solutions should be devised to handle the effects of shadow zones in Underwater Wireless Sensor Networks (UWSNs. An adaptive topology reorganization scheme that maintains connectivity in multi-hop UWSNs affected by shadow zones has been developed in the context of two Spanish-funded research projects. A mathematical model has been proposed to find the optimal location for sensors with two objectives: the minimization of the transmission loss and the maintenance of network connectivity. The theoretical analysis and the numerical evaluations reveal that our scheme reduces the transmission loss under all propagation phenomena scenarios for all water depths in UWSNs and improves the signal-to-noise ratio.

  15. Simulation of Numerical Distance Relays

    OpenAIRE

    Sherwali, Hamid; Abdlrahem, Abdlmnam

    2010-01-01

    As modern numerical relays are widely employed in protection systems nowadays and modeling of these types of relays is important to adjust and settle protection equipment in electrical facilities and to train protection personnel, the simulation of distance relays using MATLAB offers a good opportunity to perform these activities efficiently and with minimum cost. Another advantages is that, as MATLAB is a powerful tool rich with component models, any shape of relay characteristic (Impedance,...

  16. Performance analysis of differentiated resource-sharing in a wireless ad-hoc network

    NARCIS (Netherlands)

    Roijers, F.; van den Berg, H.; Mandjes, M.

    2010-01-01

    In this paper we model and analyze a relay node in a wireless ad-hoc network; the capacity available at this node is used to both transmit traffic from the source nodes (towards the relay node), and to serve traffic at the relay node (so that it can be forwarded to successor nodes). Clearly, a

  17. CERN Relay Race

    CERN Multimedia

    2009-01-01

    The CERN relay race, now in its 39th year, is already a well-known tradition, but this year the organizers say the event will have even more of a festival feeling. Just off the starting line of the CERN relay race.For the past few years, spectators and runners at the CERN relay race have been able to enjoy a beer while listening to music from the CERN music and jazz clubs. But this year the organizers are aiming for "even more of a festival atmosphere". As David Nisbet, President of the CERN running club and organizer of the relay race, says: "Work is not just about getting your head down and doing the theory, it’s also about enjoying the company of your colleagues." This year, on top of music from the Santa Luis Band and the Canettes Blues Band, there will be demonstrations from the Aikido and softball clubs, a stretching session by the Fitness club, as well as various stalls and of course, the well-earned beer from AGLUP, the B...

  18. 2005 CERN Relay Race

    CERN Multimedia

    Patrice Loiez

    2005-01-01

    The CERN Relay Race takes place each year in May and sees participants from all areas of the CERN staff. The winners in 2005 were The Shabbys with Los Latinos Volantes in second and Charmilles Technologies a close third. To add a touch of colour and levity, the CERN Jazz Club provided music at the finishing line.

  19. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Bakar, Kamalrulnizam Abu; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks. PMID:22368490

  20. Wireless sensor network for streetlight monitoring and control

    Science.gov (United States)

    Huang, Xin-Ming; Ma, Jing; Leblanc, Lawrence E.

    2004-08-01

    Wireless sensor network has attracted considerable research attention as the world becomes more information oriented. This technology provides an opportunity of innovations in traditional industries. Management and control of streetlight system is a labor-intensive high-cost task for public facility operations. This paper applies wireless sensor network technology in streetlight monitoring and control. Wireless sensor networks are employed to replace traditional physical patrol maintenance and manual switching on every lamp in the street or along the highway at the aim of reducing the maintenance and management expense. Active control is used to preserve energy cost while ensuring public safety. A proof-of-concept network architecture operated at 900 MHz industrial, scientific, and medical (ISM) band is designed for a two-way wireless telemetry system in streetlight remote control and monitoring. The radio architecture, multi-hop protocol and system interface are discussed in detail. MOTES sensor nodes are used in simulation and experimental tests. Simulation results show that the sensor network approach provides an efficient solution to monitor and control lighting infrastructures through wireless links. The unique application in this paper addresses an immediate need in streetlight control and monitoring, the architecture developed in this research could also serve as a platform for many other applications and researches in wireless sensor network.

  1. Multipath routing in wireless sensor networks: survey and research challenges.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  2. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  3. Opportunistic Relay Selection in Multicast Relay Networks using Compressive Sensing

    KAUST Repository

    Elkhalil, Khalil

    2014-12-01

    Relay selection is a simple technique that achieves spatial diversity in cooperative relay networks. However, for relay selection algorithms to make a selection decision, channel state information (CSI) from all cooperating relays is usually required at a central node. This requirement poses two important challenges. Firstly, CSI acquisition generates a great deal of feedback overhead (air-time) that could result in significant transmission delays. Secondly, the fed back channel information is usually corrupted by additive noise. This could lead to transmission outages if the central node selects the set of cooperating relays based on inaccurate feedback information. In this paper, we introduce a limited feedback relay selection algorithm for a multicast relay network. The proposed algorithm exploits the theory of compressive sensing to first obtain the identity of the “strong” relays with limited feedback. Following that, the CSI of the selected relays is estimated using linear minimum mean square error estimation. To minimize the effect of noise on the fed back CSI, we introduce a back-off strategy that optimally backs-off on the noisy estimated CSI. For a fixed group size, we provide closed form expressions for the scaling law of the maximum equivalent SNR for both Decode and Forward (DF) and Amplify and Forward (AF) cases. Numerical results show that the proposed algorithm drastically reduces the feedback air-time and achieves a rate close to that obtained by selection algorithms with dedicated error-free feedback channels.

  4. Joint Power and Resource Allocation for Block-Fading Relay-Assisted Broadcast Channels

    CERN Document Server

    Shaqfeh, Mohammad

    2012-01-01

    We provide the solution for optimizing the power and resource allocation over block-fading relay-assisted broadcast channels in order to maximize the long term average achievable rates region of the users. The problem formulation assumes regenerative (repetition coding) decode-and-forward (DF) relaying strategy, long-term average total transmitted power constraint, orthogonal multiplexing of the users messages within the channel blocks, possibility to use a direct transmission (DT) mode from the base station to the user terminal directly or a relaying (DF) transmission mode, and partial channel state information. We show that our optimization problem can be transformed into an equivalent "no-relaying" broadcast channel optimization problem with each actual user substituted by two virtual users having different channel qualities and multiplexing weights. The proposed power and resource allocation strategies are expressed in closed-form that can be applied practically in centralized relay-assisted wireless netw...

  5. Performance Analysis of Virtual MIMO Relaying Schemes Based on Detect–Split–Forward

    KAUST Repository

    Al-Basit, Suhaib M.

    2014-10-29

    © 2014, Springer Science+Business Media New York. Virtual multi-input multi-output (vMIMO) schemes in wireless communication systems improve coverage, throughput, capacity, and quality of service. In this paper, we propose three uplink vMIMO relaying schemes based on detect–split–forward (DSF). In addition, we investigate the effect of several physical parameters such as distance, modulation type and number of relays. Furthermore, an adaptive vMIMO DSF scheme based on VBLAST and STBC is proposed. In order to do that, we provide analytical tools to evaluate the performance of the propose vMIMO relaying scheme.

  6. Relay-assisted Network Coding Multicast in the Presence of Neighbours

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Pahlevani, Peyman

    2015-01-01

    We study the problem of minimizing the cost of packet transmission from a source to two receivers with the help of a relay and using network coding in wireless mesh networks consisting of many active neighbours sharing the same channel. The cost minimization problem is modeled as a Markov Decision...... in the presence of active neighbours compared to multicasting directly from the source. We further show that in scenarios which the links between relay and destinations are not better than the links between source and destinations, a relay can still provide up to 1.7x gain....

  7. Laser Communications Relay Demonstration Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Laser Communications Relay Demonstration project will advance optical communications technology, expanding industry’s capability to produce competitive,...

  8. Cooperative AF Relaying in Spectrum-Sharing Systems: Outage Probability Analysis under Co-Channel Interferences and Relay Selection

    KAUST Repository

    Xia, Minghua

    2012-11-01

    For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary transmitters is strictly limited by the tolerable interference powers at primary receivers. Furthermore, the received signals at a relay and at a secondary receiver are inevitably interfered by the signals from primary transmitters. These co-channel interferences (CCIs) from concurrent primary transmission can significantly degrade the performance of secondary transmission. This paper studies the effect of CCIs on outage probability of the secondary link in a spectrum-sharing environment. In particular, in order to compensate the performance loss due to CCIs, the transmit powers of a secondary transmitter and its relaying node are respectively optimized with respect to both the tolerable interference powers at the primary receivers and the CCIs from the primary transmitters. Moreover, when multiple relays are available, the technique of opportunistic relay selection is exploited to further improve system performance with low implementation complexity. By analyzing lower and upper bounds on the outage probability of the secondary system, this study reveals that it is the tolerable interference powers at primary receivers that dominate the system performance, rather than the CCIs from primary transmitters. System designers will benefit from this result in planning and designing next-generation broadband spectrum-sharing systems.

  9. 49 CFR 234.263 - Relays.

    Science.gov (United States)

    2010-10-01

    .... (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with soft iron magnetic structure shall be tested at least once every two years. (2) Alternating current...

  10. 47th Relay Race!

    CERN Multimedia

    Staff Association

    2017-01-01

    On Thursday June 1st at 12.15, Fabiola Gianotti, our Director-General, will fire the starting shot for the 47th Relay Race. This Race is above all a festive CERN event, open for runners and walkers, as well as the people cheering them on throughout the race, and those who wish to participate in the various activities organised between 11.30 and 14.30 out on the lawn in front of Restaurant 1. In order to make this sports event accessible for everyone, our Director-General will allow for flexible lunch hours on the day, applicable for all the members of personnel. An alert for the closure of roads will be send out on the day of the event. The Staff Association and the CERN Running Club thank you in advance for your participation and your continued support throughout the years. This year the CERN Running Club has announced the participation of locally and internationally renowned runners, no less! A bit over a week from the Relay Race of 1st June, the number of teams is going up nicely (already almost 40). Am...

  11. CERN Relay Race

    CERN Multimedia

    Running Club

    2010-01-01

    This year’s CERN Relay Race will take place around the Meyrin site on Thursday 20th May at 12h00. This annual event is for teams of 6 runners covering distances of 1000m, 800m, 800m, 500m, 500m and 300m respectively. Teams may be entered in the Seniors, Veterans, Ladies, Mixed or Open categories. The registration fee is 10 CHF per runner, and each runner receives a souvenir prize. As usual, there will be a programme of entertainments from 12h in the arrival area, in front of the Restaurant no. 1. Drinks, food, CERN club information and music will be available for the pleasure of both runners and spectators. The race starts at 12h15, with results and prize giving at 13:15.   For details of the race, and of how to sign up a team, please visit: https://espace.cern.ch/Running-Club/CERN-Relay The event is organised by the CERN Running Club with the support of the CERN Staff Association.  

  12. Data Collection using Miniature Aerial Vehicles in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2016-01-01

    Energy constraints of sensor nodes in wireless sensor networks (WSNs) is a major challenge and minimising the overall data transmitted across a network using data aggregation, distributed source coding, and compressive sensing have been proposed as mechanisms for energy saving. Similarly, use...... of mobile nodes capable of relocating within the network has been widely explored for energy saving. In this paper, we propose a novel method for using miniature aerial vehicles (MAVs) for data collection instead of actively sensing from a deployed network. The proposed mechanism is referred as Data...... Collection Fly (DCFly). It is suitable for data collection from WSNs deployed in harsh-undulating terrain with the base station (BS) located far from the sensing region. The DCFly is compared with data collection based on multi-hop data aggregation and data collection with mobile sinks. The numerical results...

  13. Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2017-01-01

    Full Text Available We propose a robust wireless relay scheme in narrow-band communications for IoT access, which matches the typical features of IoT often carrying relatively low data rate with limited bandwidth. This framework is towards offering robustness in QoS guarantees with emphases on security and/or reliability, and we use the security-assured network as the typical scenario. In particular, we consider a dual-hop relay network including a transmitter, a receiver, an amplify-and-forward (AF untrusted relay, and a jamming node. The jamming node is treated as a helper. Specifically, the jammer broadcasts artificial noise (AN, which in fact pollutes both the untrusted relay and the destination node’s signals. However, we show that such AN can be effectively mitigated after the destination node obtains the forwarded signal from the relay, while the untrusted relay node cannot do so. The core idea for robustness assurance is to exploit higher signal dimensions at the receiver over the untrusted relay node. Simulations and analyses are also conducted to demonstrate that our proposed scheme can make the performance at the untrusted relay an interference-limited manner while completely removing the interferences at the receiver, therefore corroborating our claim in robustness in terms of security and reliability.

  14. CERN Relay Race

    CERN Multimedia

    2005-01-01

    The CERN Relay Race will take place around the Meyrin site on Wednesday 18 May between 12.15 and 12.35. This year, weather permitting, there will be some new attractions in the start/finish area on the field behind the Main Building. You will be able to: listen to music played by the CERN Jazz Club; buy drinks at the bar organised by the CERN Running Club; buy lunch served directly on the terrace by the restaurant Novae. ATTENTION: concerning traffic, the recommendations are the same as always: If possible, please avoid driving on the site during this 20 minute period. If you do meet runners in your car, please STOP until they all have passed. Thank you for your understanding.

  15. Asymptotic Analysis of Large Cooperative Relay Networks Using Random Matrix Theory

    Directory of Open Access Journals (Sweden)

    H. Poor

    2008-04-01

    Full Text Available Cooperative transmission is an emerging communication technology that takes advantage of the broadcast nature of wireless channels. In cooperative transmission, the use of relays can create a virtual antenna array so that multiple-input/multiple-output (MIMO techniques can be employed. Most existing work in this area has focused on the situation in which there are a small number of sources and relays and a destination. In this paper, cooperative relay networks with large numbers of nodes are analyzed, and in particular the asymptotic performance improvement of cooperative transmission over direction transmission and relay transmission is analyzed using random matrix theory. The key idea is to investigate the eigenvalue distributions related to channel capacity and to analyze the moments of this distribution in large wireless networks. A performance upper bound is derived, the performance in the low signal-to-noise-ratio regime is analyzed, and two approximations are obtained for high and low relay-to-destination link qualities, respectively. Finally, simulations are provided to validate the accuracy of the analytical results. The analysis in this paper provides important tools for the understanding and the design of large cooperative wireless networks.

  16. Wireless sensor placement for structural monitoring using information-fusing firefly algorithm

    Science.gov (United States)

    Zhou, Guang-Dong; Yi, Ting-Hua; Xie, Mei-Xi; Li, Hong-Nan

    2017-10-01

    Wireless sensor networks (WSNs) are promising technology in structural health monitoring (SHM) applications for their low cost and high efficiency. The limited wireless sensors and restricted power resources in WSNs highlight the significance of optimal wireless sensor placement (OWSP) during designing SHM systems to enable the most useful information to be captured and to achieve the longest network lifetime. This paper presents a holistic approach, including an optimization criterion and a solution algorithm, for optimally deploying self-organizing multi-hop WSNs on large-scale structures. The combination of information effectiveness represented by the modal independence and the network performance specified by the network connectivity and network lifetime is first formulated to evaluate the performance of wireless sensor configurations. Then, an information-fusing firefly algorithm (IFFA) is developed to solve the OWSP problem. The step sizes drawn from a Lévy distribution are adopted to drive fireflies toward brighter individuals. Following the movement with Lévy flights, information about the contributions of wireless sensors to the objective function as carried by the fireflies is fused and applied to move inferior wireless sensors to better locations. The reliability of the proposed approach is verified via a numerical example on a long-span suspension bridge. The results demonstrate that the evaluation criterion provides a good performance metric of wireless sensor configurations, and the IFFA outperforms the simple discrete firefly algorithm.

  17. Testing a Firefly-Inspired Synchronization Algorithm in a Complex Wireless Sensor Network.

    Science.gov (United States)

    Hao, Chuangbo; Song, Ping; Yang, Cheng; Liu, Xiongjun

    2017-03-08

    Data acquisition is the foundation of soft sensor and data fusion. Distributed data acquisition and its synchronization are the important technologies to ensure the accuracy of soft sensors. As a research topic in bionic science, the firefly-inspired algorithm has attracted widespread attention as a new synchronization method. Aiming at reducing the design difficulty of firefly-inspired synchronization algorithms for Wireless Sensor Networks (WSNs) with complex topologies, this paper presents a firefly-inspired synchronization algorithm based on a multiscale discrete phase model that can optimize the performance tradeoff between the network scalability and synchronization capability in a complex wireless sensor network. The synchronization process can be regarded as a Markov state transition, which ensures the stability of this algorithm. Compared with the Miroll and Steven model and Reachback Firefly Algorithm, the proposed algorithm obtains better stability and performance. Finally, its practicality has been experimentally confirmed using 30 nodes in a real multi-hop topology with low quality links.

  18. Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying

    Directory of Open Access Journals (Sweden)

    Jiazi Liu

    2017-01-01

    Full Text Available Physical layer authentication techniques developed in conventional macrocell wireless networks face challenges when applied in the future fifth-generation (5G wireless communications, due to the deployment of dense small cells in a hierarchical network architecture. In this paper, we propose a novel physical layer authentication scheme by exploiting the advantages of amplify-and-forward (AF cooperative relaying, which can increase the coverage and convergence of the heterogeneous networks. The essence of the proposed scheme is to select the best relay among multiple AF relays for cooperation between legitimate transmitter and intended receiver in the presence of a spoofer. To achieve this goal, two best relay selection schemes are developed by maximizing the signal-to-noise ratio (SNR of the legitimate link to the spoofing link at the destination and relays, respectively. In the sequel, we derive closed-form expressions for the outage probabilities of the effective SNR ratios at the destination. With the help of the best relay, a new test statistic is developed for making an authentication decision, based on normalized channel difference between adjacent end-to-end channel estimates at the destination. The performance of the proposed authentication scheme is compared with that in a direct transmission in terms of outage and spoofing detection.

  19. Joint Subcarrier Pairing and Resource Allocation for Cognitive Network and Adaptive Relaying Strategy

    KAUST Repository

    Soury, Hamza

    2012-05-01

    Recent measurements show that the spectrum is under-utilized by licensed users in wireless communication. Cognitive radio (CR) has been proposed as a suitable solution to manage the inefficient usage of the spectrum and increase coverage area of wireless networks. The concept is based on allowing a group of secondary users (SUs) to share the unused radio spectrum originally owned by the primary user (PUs). The operation of CR should not cause harmful interference to the PUs. In the other hand, relayed transmission increases the coverage and achievable capacity of communication systems and in particular in CR systems. In fact there are many types of cooperative communications, however the two main ones are decode-and-forward (DAF) and amplify-and-forward (AAF). Adaptive relaying scheme is a relaying technique by which the benefits of the amplifying or decode and forward techniques can be achieved by switching the forwarding technique according to the quality of the signal. In this dissertation, we investigate the power allocation for an adaptive relaying protocol (ARP) scheme in cognitive system by maximizing the end-to-end rate and searching the best carriers pairing distribution. The optimization problem is under the interference and power budget constraints. The simulation results confirm the efficiency of the proposed adaptive relaying protocol in comparison to other relaying techniques, and the consequence of the choice of the pairing strategy.

  20. Diversity-Multiplexing Trade-off for Coordinated Relayed Uplink and Direct Downlink Transmissions

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar; Sun, Fan

    2013-01-01

    Abstract—There are two basic principles used in wireless network coding to design throughput-efficient schemes: (1) aggregation of communication flows and (2) interference is embraced and subsequently cancelled or mitigated. These principles inspire design of Coordinated Direct/Relay (CDR) scheme...

  1. Efficient Capacity Computation and Power Optimization for Relay Networks

    CERN Document Server

    Parvaresh, Farzad

    2011-01-01

    The capacity or approximations to capacity of various single-source single-destination relay network models has been characterized in terms of the cut-set upper bound. In principle, a direct computation of this bound requires evaluating the cut capacity over exponentially many cuts. We show that the minimum cut capacity of a relay network under some special assumptions can be cast as a minimization of a submodular function, and as a result, can be computed efficiently. We use this result to show that the capacity, or an approximation to the capacity within a constant gap for the Gaussian, wireless erasure, and Avestimehr-Diggavi-Tse deterministic relay network models can be computed in polynomial time. We present some empirical results showing that computing constant-gap approximations to the capacity of Gaussian relay networks with around 300 nodes can be done in order of minutes. For Gaussian networks, cut-set capacities are also functions of the powers assigned to the nodes. We consider a family of power o...

  2. Novel Framework for Data Collection in Wireless Sensor Networks Using Flying Sensors

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2014-01-01

    This paper proposes a novel framework for data collection from a sensor network using flying sensor nodes. Efficient data communication within the network is a necessity as sensor nodes are usually energy constrained. The proposed framework utilizes the various entities forming the network...... for a different utility compared to their usual role in sensor networks. Use of flying sensor nodes is usually considered for conventional purpose of sensing and monitoring. Flying sensing nodes are usually utilized collectively in the form of an aerial sensor network, they are not expected to function as a data...... intensive multi-hop inter-cluster communication to relay information to the BS. The flying sensor node is referred as sensor fly. The limitations of a conventional sensor network deployed on ground surface, in respect to the near ground path loss, and communication hindrance due to undulating terrain...

  3. On network coding and modulation mapping for three-phase bidirectional relaying

    KAUST Repository

    Chang, Ronald Y.

    2015-12-03

    © 2015 IEEE. In this paper, we consider the network coding (NC) enabled three-phase protocol for information exchange between two users in a wireless two-way (bidirectional) relay network. Modulo-based (nonbinary) and XOR-based (binary) NC schemes are considered as information mixture schemes at the relay while all transmissions adopt pulse amplitude modulation (PAM). We first obtain the optimal constellation mapping at the relay that maximizes the decoding performance at the users for each NC scheme. Then, we compare the two NC schemes, each in conjunction with the optimal constellation mapping at the relay, in different conditions. Our results demonstrate that, in the low SNR regime, binary NC outperforms nonbinary NC with 4-PAM, while they have mixed performance with 8-PAM. This observation applies to quadrature amplitude modulation (QAM) composed of two parallel PAMs.

  4. Lower Bounds on the Capacity of the Relay Channel with States at the Source

    Directory of Open Access Journals (Sweden)

    Abdellatif Zaidi

    2009-01-01

    Full Text Available We consider a state-dependent three-terminal full-duplex relay channel with the channel states noncausally available at only the source, that is, neither at the relay nor at the destination. This model has application to cooperation over certain wireless channels with asymmetric cognition capabilities and cognitive interference relay channels. We establish lower bounds on the channel capacity for both discrete memoryless (DM and Gaussian cases. For the DM case, the coding scheme for the lower bound uses techniques of rate-splitting at the source, decode-and-forward (DF relaying, and a Gel'fand-Pinsker-like binning scheme. In this coding scheme, the relay decodes only partially the information sent by the source. Due to the rate-splitting, this lower bound is better than the one obtained by assuming that the relay decodes all the information from the source, that is, full-DF. For the Gaussian case, we consider channel models in which each of the relay node and the destination node experiences on its link an additive Gaussian outside interference. We first focus on the case in which the links to the relay and to the destination are corrupted by the same interference; and then we focus on the case of independent interferences. We also discuss a model with correlated interferences. For each of the first two models, we establish a lower bound on the channel capacity. The coding schemes for the lower bounds use techniques of dirty paper coding or carbon copying onto dirty paper, interference reduction at the source and decode-and-forward relaying. The results reveal that, by opposition to carbon copying onto dirty paper and its root Costa's initial dirty paper coding (DPC, it may be beneficial in our setup that the informed source uses a part of its power to partially cancel the effect of the interference so that the uninformed relay benefits from this cancellation, and so the source benefits in turn.

  5. The 2009 Relay Race

    CERN Multimedia

    2009-01-01

    The 2009 CERN Relay Race was as popular as ever, with a record number of 88 teams competing. var flash_video_player=get_video_player_path(); insert_player_for_external('Video/Public/Movies/2009/CERN-MOVIE-2009-048/CERN-MOVIE-2009-048-0753-kbps-480x360-25-fps-audio-64-kbps-44-kHz-stereo', 'mms://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-048/CERN-MOVIE-2009-048-Multirate-200-to-753-kbps-480x360.wmv', 'false', 288, 216, 'https://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-048/CERN-MOVIE-2009-048-posterframe-480x360-at-10-percent.jpg', '1178303', true, 'Video/Public/Movies/2009/CERN-MOVIE-2009-048/CERN-MOVIE-2009-048-0600-kbps-maxH-360-25-fps-audio-128-kbps-48-kHz-stereo.mp4'); Even the rain didn’t dampen the spirits, and it still managed to capture the ‘festival feeling’ with live music, beer and stalls from various CERN clubs set up outside Restaurant 1. The Powercuts on the podium after win...

  6. Implementation of WirelessHART in the NS-2 Simulator and Validation of Its Correctness

    Directory of Open Access Journals (Sweden)

    Pouria Zand

    2014-05-01

    Full Text Available One of the first standards in the wireless sensor networks domain,WirelessHART (HART (Highway Addressable Remote Transducer, was introduced to address industrial process automation and control requirements. This standard can be used as a reference point to evaluate other wireless protocols in the domain of industrial monitoring and control. This makes it worthwhile to set up a reliable WirelessHART simulator in order to achieve that reference point in a relatively easy manner. Moreover, it offers an alternative to expensive testbeds for testing and evaluating the performance of WirelessHART. This paper explains our implementation of WirelessHART in the NS-2 network simulator. According to our knowledge, this is the first implementation that supports the WirelessHART network manager, as well as the whole stack (all OSI (Open Systems Interconnection model layers of the WirelessHART standard. It also explains our effort to validate the correctness of our implementation, namely through the validation of the implementation of the WirelessHART stack protocol and of the network manager. We use sniffed traffic from a realWirelessHART testbed installed in the Idrolab plant for these validations. This confirms the validity of our simulator. Empirical analysis shows that the simulated results are nearly comparable to the results obtained from real networks. We also demonstrate the versatility and usability of our implementation by providing some further evaluation results in diverse scenarios. For example, we evaluate the performance of the WirelessHART network by applying incremental interference in a multi-hop network.

  7. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors

    Directory of Open Access Journals (Sweden)

    Yishan Su

    2017-04-01

    Full Text Available Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1 to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2 the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3 the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  8. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.

    Science.gov (United States)

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-04-06

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  9. Exact Performance Analysis of Partial Relay Selection Based on Shadowing Side Information over Generalized Composite Fading Channels

    CERN Document Server

    Yilmaz, Ferkan

    2011-01-01

    Relay technology has recently gained great interest in millimeter wave (60 GHz or above) radio frequencies as a promising transmission technique improving the quality of service, providing high data rate, and extending the coverage area without additional transmit power in deeply shadowed wireless environments. The performance of relay-based systems depends considerably on which relay selection protocols are used. These protocols are typically using the channel side information (CSI). Specifically, the relay terminal (RT) is chosen among all available RTs by a centralized entity (CE) which receives all RTs' CSI via feedback channels. However, in the millimeter wave radio frequencies, the rate of the variation of the CSI is much higher than that of a classical system operating in 6 GHz frequencies under the same mobility conditions, which evidently results in a serious problem causing outdated (inaccurate) CSI for the relay selection protocol at the CE since the feedback channels have a backhaul / transmission...

  10. Energy-harvesting in cooperative AF relaying networks over log-normal fading channels

    KAUST Repository

    Rabie, Khaled M.

    2016-07-26

    Energy-harvesting (EH) and wireless power transfer are increasingly becoming a promising source of power in future wireless networks and have recently attracted a considerable amount of research, particularly on cooperative two-hop relay networks in Rayleigh fading channels. In contrast, this paper investigates the performance of wireless power transfer based two-hop cooperative relaying systems in indoor channels characterized by log-normal fading. Specifically, two EH protocols are considered here, namely, time switching relaying (TSR) and power splitting relaying (PSR). Our findings include accurate analytical expressions for the ergodic capacity and ergodic outage probability for the two aforementioned protocols. Monte Carlo simulations are used throughout to confirm the accuracy of our analysis. The results show that increasing the channel variance will always provide better ergodic capacity performance. It is also shown that a good selection of the EH time in the TSR protocol, and the power splitting factor in the PTS protocol, is the key to achieve the best system performance. © 2016 IEEE.

  11. Wireless Energy Harvesting Cooperative Communications with Direct Link and Energy Accumulation

    OpenAIRE

    Li, Ziyi; Chen, He; Li, Yonghui; Vucetic, Branka

    2016-01-01

    This paper investigates a wireless energy harvesting cooperative network (WEHCN) consisting of a source, a decode-and-forward (DF) relay and a destination. We consider the relay as an energy harvesting (EH) node equipped with EH circuit and a rechargeable battery. Moreover, the direct link between source and destination is assumed to exist. The relay can thus harvest and accumulate energy from radio-frequency signals ejected by the source and assist its information transmission opportunistica...

  12. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming

    KAUST Repository

    Park, Kihong

    2013-09-01

    In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods. © 1983-2012 IEEE.

  13. Performance limitations of relay neurons.

    Directory of Open Access Journals (Sweden)

    Rahul Agarwal

    Full Text Available Relay cells are prevalent throughout sensory systems and receive two types of inputs: driving and modulating. The driving input contains receptive field properties that must be transmitted while the modulating input alters the specifics of transmission. For example, the visual thalamus contains relay neurons that receive driving inputs from the retina that encode a visual image, and modulating inputs from reticular activating system and layer 6 of visual cortex that control what aspects of the image will be relayed back to visual cortex for perception. What gets relayed depends on several factors such as attentional demands and a subject's goals. In this paper, we analyze a biophysical based model of a relay cell and use systems theoretic tools to construct analytic bounds on how well the cell transmits a driving input as a function of the neuron's electrophysiological properties, the modulating input, and the driving signal parameters. We assume that the modulating input belongs to a class of sinusoidal signals and that the driving input is an irregular train of pulses with inter-pulse intervals obeying an exponential distribution. Our analysis applies to any [Formula: see text] order model as long as the neuron does not spike without a driving input pulse and exhibits a refractory period. Our bounds on relay reliability contain performance obtained through simulation of a second and third order model, and suggest, for instance, that if the frequency of the modulating input increases or the DC offset decreases, then relay increases. Our analysis also shows, for the first time, how the biophysical properties of the neuron (e.g. ion channel dynamics define the oscillatory patterns needed in the modulating input for appropriately timed relay of sensory information. In our discussion, we describe how our bounds predict experimentally observed neural activity in the basal ganglia in (i health, (ii in Parkinson's disease (PD, and (iii in PD during

  14. Optical wireless communication through random media

    Science.gov (United States)

    Arnon, Shlomi

    2011-03-01

    The growing need for high data-rate communication both through the atmosphere and the ocean (sub-sea) has stimulated considerable interest in optical wireless communication (OWC) technologies. The main advantages of OWC as compared with RF communication in the atmosphere and with acoustic communication in sub-sea applications are a) high achievable data-rate, b) small size of equipment and c) low power-consumption. On the other hand the characteristics of the communication channel in both scenarios are stochastic with high values of variance, which severely degrades OWC communication system performance. In this paper we present a tutorial discussing the effects of random media on OWC and expand on two examples: Monte-Carlo simulation for sub-sea communication and mathematical synthesis using Meijer G-function for OWC through atmospheric turbulence. These two examples demonstrate that it is possible to gain significant insights on the effects of the random channel on system performance. The results of the different analysis methods could also indicate solutions for the improvement of performance using adaptive solutions or for extending the communication range by applying a multi-hop concept. We summarize the paper with a brief review of two emerging research fields that could, surprisingly, benefit from the characteristics of light propagation through random media and its effect on the communication system performance. The first research field is trans-cutaneous OWC and the second is an unguided optical communication bus for next-generation computers.

  15. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network.

    Science.gov (United States)

    Choi, Sangil; Park, Jong Hyuk

    2016-12-02

    Wireless mesh networks (WMNs) have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA) algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM). In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  16. Handover Framework for Relay Enhanced LTE Networks

    DEFF Research Database (Denmark)

    Teyeb, Oumer Mohammed; Van Phan, Vinh; Raaf, Bernhard

    2009-01-01

    Relaying is one of the proposed technologies for future releases of UTRAN Long Term Evolution (LTE) networks. Introducing relaying is expected to increase the coverage and capacity of LTE networks. In order to enable relaying, the architecture, protocol and radio resource management procedures...... of LTE, such as handover, have to be modified. A user can be handed over not only between two base stations, but also between relays and base stations, and between two relays. With the introduction of relaying, there is a need for a new procedure to hand over a relay and all its associated users...... to another base station, allowing a flexible and dynamic relay deployment. In this paper, we extend the LTE release 8 handover mechanisms so that it can accommodate these new handover functionalities in a flexible manner....

  17. Speech-to-Speech Relay Service

    Science.gov (United States)

    Consumer Guide Speech to Speech Relay Service Speech-to-Speech (STS) is one form of Telecommunications Relay Service (TRS). TRS is a service that allows persons with hearing and speech disabilities ...

  18. Using Wireless Network Coding to Replace a Wired with Wireless Backhaul

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    of wireless emulated wire (WEW), based on two-way relaying and network coding. This setup leads to a new type of broadcast problem, with decoding conditions that are specific to the requirement for equivalence to the wired backhaul. We formulate and solve the associated optimization problems. The proposed...

  19. Development and Testing of a Two-UAV Communication Relay System

    Directory of Open Access Journals (Sweden)

    Boyang Li

    2016-10-01

    Full Text Available In the development of beyond-line-of-sight (BLOS Unmanned Aerial Vehicle (UAV systems, communication between the UAVs and the ground control station (GCS is of critical importance. The commonly used economical wireless modules are restricted by the short communication range and are easily blocked by obstacles. The use of a communication relay system provides a practical way to solve these problems, improving the performance of UAV communication in BLOS and cross-obstacle operations. In this study, a communication relay system, in which a quadrotor was used to relay radio communication for another quadrotor was developed and tested. First, the UAVs used as the airborne platform were constructed, and the hardware for the communication relay system was selected and built up. Second, a set of software programs and protocol for autonomous mission control, communication relay control, and ground control were developed. Finally, the system was fully integrated into the airborne platform and tested both indoor and in-flight. The Received Signal Strength Indication (RSSI and noise value in two typical application scenarios were recorded. The test results demonstrated the ability of this system to extend the communication range and build communication over obstacles. This system also shows the feasibility to coordinate multiple UAVs’ communication with the same relay structure.

  20. Outage Analysis and Optimization of SWIPT in Network-Coded Two-Way Relay Networks

    Directory of Open Access Journals (Sweden)

    Ruihong Jiang

    2017-01-01

    Full Text Available This paper investigates the outage performance of simultaneous wireless information and power transfer (SWIPT in network-coded two-way relay systems, where a relay first harvests energy from the signals transmitted by two sources and then uses the harvested energy to forward the received information to the two sources. We consider two transmission protocols, power splitting two-way relay (PS-TWR and time switching two-way relay (TS-TWR protocols. We present two explicit expressions for the system outage probability of the two protocols and further derive approximate expressions for them in high and low SNR cases. To explore the system performance limits, two optimization problems are formulated to minimize the system outage probability. Since the problems are nonconvex and have no known solution methods, a genetic algorithm- (GA- based algorithm is designed. Numerical and simulation results validate our theoretical analysis. It is shown that, by jointly optimizing the time assignment and SWIPT receiver parameters, a great performance gain can be achieved for both PS-TWR and TS-TWR. Moreover, the optimized PS-TWR always outperforms the optimized TS-TWR in terms of outage performance. Additionally, the effects of parameters including relay location and transmit powers are also discussed, which provide some insights for the SWIPT-enabled two-way relay networks.

  1. Quantum cryptography with an ideal local relay

    DEFF Research Database (Denmark)

    Spedalieri, Gaetana; Ottaviani, Carlo; Braunstein, Samuel L.

    2015-01-01

    We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay ...

  2. Robust distributed cognitive relay beamforming

    KAUST Repository

    Pandarakkottilil, Ubaidulla

    2012-05-01

    In this paper, we present a distributed relay beamformer design for a cognitive radio network in which a cognitive (or secondary) transmit node communicates with a secondary receive node assisted by a set of cognitive non-regenerative relays. The secondary nodes share the spectrum with a licensed primary user (PU) node, and each node is assumed to be equipped with a single transmit/receive antenna. The interference to the PU resulting from the transmission from the cognitive nodes is kept below a specified limit. The proposed robust cognitive relay beamformer design seeks to minimize the total relay transmit power while ensuring that the transceiver signal-to-interference- plus-noise ratio and PU interference constraints are satisfied. The proposed design takes into account a parameter of the error in the channel state information (CSI) to render the performance of the beamformer robust in the presence of imperfect CSI. Though the original problem is non-convex, we show that the proposed design can be reformulated as a tractable convex optimization problem that can be solved efficiently. Numerical results are provided and illustrate the performance of the proposed designs for different network operating conditions and parameters. © 2012 IEEE.

  3. Proxy-Based IPv6 Neighbor Discovery Scheme for Wireless LAN Based Mesh Networks

    Science.gov (United States)

    Lee, Jihoon; Jeon, Seungwoo; Kim, Jaehoon

    Multi-hop Wireless LAN-based mesh network (WMN) provides high capacity and self-configuring capabilities. Due to data forwarding and path selection based on MAC address, WMN requires additional operations to achieve global connectivity using IPv6 address. The neighbor discovery operation over WLAN mesh networks requires repeated all-node broadcasting and this gives rise to a big burden in the entire mesh networks. In this letter, we propose the proxy neighbor discovery scheme for optimized IPv6 communication over WMN to reduce network overhead and communication latency. Using simulation experiments, we show that the control overhead and communication setup latency can be significantly reduced using the proxy-based neighbor discovery mechanism.

  4. AN ENERGY EFFICIENT FITNESS BASED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    A. Balamurugan

    2014-03-01

    Full Text Available A wireless sensor network is a self-organized multi hop network that consists of a large number of sensor nodes. The efficiency of the sensor networks depends upon the routing protocol used. There are different routing protocols exists to extend the network lifetime by efficiently consuming the energy of the nodes. The nodes have limited energy resources and are battery powered. Therefore, designing an effective routing protocol that conserve scarce energy resources is the major critical issue in WSN. In this paper, a Fitness based Routing Protocol (FRP is proposed to optimize energy efficient data transmission. The energy consumption of nodes is reduced by selecting the nodes with minimum hop count and distance. Genetic algorithm is used as an optimization technique to find the fitted node based on its fitness value. The FRP could increase the network lifetime and throughput comparing to the other protocols. The protocol could also reduce the packet loss and end – end delay.

  5. End-to-end delay analysis in wireless sensor networks with service vacation

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-04-01

    In this paper, a delay-sensitive multi-hop wireless sensor network is considered, employing an M/G/1 with vacations framework. Sensors transmit measurements to a predefined data sink subject to maximum end-to-end delay constraint. In order to prolong the battery lifetime, a sleeping scheme is adopted throughout the network nodes. The objective of our proposed framework is to present an expression for maximum hop-count as well as an approximate expression of the probability of blocking at the sink node upon violating certain end-to-end delay threshold. Using numerical simulations, we validate the proposed analytical model and demonstrate that the blocking probability of the system for various vacation time distributions matches the simulation results.

  6. Two Tier Cluster Based Data Aggregation (TTCDA) in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    the packet count reached at the sink. Here, we propose Two Tier Cluster based Data Aggregation (TTCDA) algorithm for the randomly distributed nodes to minimize computation and communication cost. The TTCDA is energy and bandwidth efficient since it reduces the transmission of the number of packets......Wireless Sensor Network (WSN) often used for monitoring and control applications where sensor nodes collect data and send it to the sink. Most of the nodes consume their energy in transmission of data packets without aggregation to sink, which may be located at single or multi hop distance....... The direct transmission of data packets to the sink from nodes in the network causes increased communication costs in terms of energy, average delay and network lifetime. In this context, the data aggregation techniques minimize the communication cost with efficient bandwidth utilization by decreasing...

  7. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Myong-Soon Park

    2011-07-01

    Full Text Available RFID (Radio frequency identification and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  8. Energy efficient in-network RFID data filtering scheme in wireless sensor networks.

    Science.gov (United States)

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes' energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  9. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Liaqat, Misbah; Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram; Ali, Rana Liaqat

    A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results.

  10. Towards Perpetual Energy Operation in Wireless Communication Systems

    KAUST Repository

    Benkhelifa, Fatma

    2017-11-01

    Wireless is everywhere. Smartphones, tablets, laptops, implantable medical devices, and many other wireless devices are massively taking part of our everyday activities. On average, an actively digital consumer has three devices. However, most of these wireless devices are small equipped with batteries that are often limited and need to be replaced or recharged. This fact limits the operating lifetime of wireless devices and presents a major challenge in wireless communication. To improve the perpetual energy operation of wireless communication systems, energy harvesting (EH) from the radio frequency (RF) signals is one promising solution to make the wireless communication systems self-sustaining. Since RF signals are known to transmit information, it is interesting to study when RF signals are simultaneously used to transmit information and scavenge energy, namely simultaneous wireless information and power transfer (SWIPT). In this thesis, we specifically aim to study the SWIPT in multiple-input multiple-output (MIMO) relay communication systems and in cognitive radio (CR) networks. First, we study the SWIPT in MIMO relay systems where the relay harvests the energy from the source and uses partially/fully the harvested energy to forward the signal to the destination. For both the amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols, we consider the ideal scheme where both the energy and information transfer to the relay happen simultaneously, and the practical power splitting and time switching schemes. For each scheme, we aim to maximize the achievable end-to-end rate with a certain energy constraint at the relay. Furthermore, we consider the sum rate maximization problem for the multiuser MIMO DF relay broadcasting channels with multiple EH-enabled relays, and an enhanced low complex solution is proposed based on the block diagonalization method. Finally, we study the energy and data performance of the SWIPT in CR network where either the

  11. Relay Selection with Limited and Noisy Feedback

    KAUST Repository

    Eltayeb, Mohammed E.

    2016-01-28

    Relay selection is a simple technique that achieves spatial diversity in cooperative relay networks. Nonetheless, relay selection algorithms generally require error-free channel state information (CSI) from all cooperating relays. Practically, CSI acquisition generates a great deal of feedback overhead that could result in significant transmission delays. In addition to this, the fed back channel information is usually corrupted by additive noise. This could lead to transmission outages if the central node selects the set of cooperating relays based on inaccurate feedback information. In this paper, we propose a relay selection algorithm that tackles the above challenges. Instead of allocating each relay a dedicated channel for feedback, all relays share a pool of feedback channels. Following that, each relay feeds back its identity only if its effective channel (source-relay-destination) exceeds a threshold. After deriving closed-form expressions for the feedback load and the achievable rate, we show that the proposed algorithm drastically reduces the feedback overhead and achieves a rate close to that obtained by selection algorithms with dedicated error-free feedback from all relays. © 2015 IEEE.

  12. Cooperative jamming power control to enhance secrecy communications of AF Relaying systems for Rayleigh fading channel

    KAUST Repository

    Park, Kihong

    2012-09-01

    In this paper, we investigate secrecy communications in two-hop wireless relaying networks which consist of one source, one amplify-and-forward (AF) relay, one legitimate destination, and one eavesdropper. To prevent the eavesdropper from intercepting the source message, we make the destination send the intended noise to the AF relay during the first phase. This is referred to as cooperative jamming. According to the channel information at the destination, we address two types of jamming power allocation; (i) rate-optimal power allocation and (ii) outage-optimal power allocation. More specifically, without the instantaneous channel knowledge for the eavesdropper side, the outage probability of the secrecy rate is minimized with respect to the intended noise power level. We show that the outage-optimal allocation gives almost the same outage probability as the rateoptimal one. In addition, the jamming power consumption can be significantly reduced compared to the fixed and rate-optimal power allocation methods. © 2012 IEEE.

  13. Energy-Efficient Opportunistic Transmission Scheduling for Sparse Sensor Networks with Mobile Relays

    Directory of Open Access Journals (Sweden)

    Wei Liu

    2016-01-01

    Full Text Available Wireless sensing devices have been widely used in civilian and military applications over the past decade. In some application scenarios, the sensors are sparsely deployed in the field and are costly or infeasible to have stable communication links for delivering the collected data to the destined server. A possible solution is to utilize the motion of entities that are already present in the environment to provide opportunistic relaying services for sensory data. In this paper, we design and propose a new scheduling scheme that opportunistically schedules data transmissions based on the optimal stopping theory, with a view of minimizing the energy consumption on network probes for data delivery. In fact, by exploiting the stochastic characteristics of the relay motion, we can postpone the communication up to an acceptable time deadline until the best relay is found. Simulation results validate the effectiveness of the derived optimal strategy.

  14. Two-way cooperative AF relaying in spectrum-sharing systems: Enhancing cell-edge performance

    KAUST Repository

    Xia, Minghua

    2012-09-01

    In this contribution, two-way cooperative amplify-and-forward (AF) relaying technique is integrated into spectrumsharing wireless systems to improve spectral efficiency of secondary users (SUs). In order to share the available spectrum resources originally dedicated to primary users (PUs), the transmit power of a SU is optimized with respect to the average tolerable interference power at primary receivers. By analyzing outage probability and achievable data rate at the base station and at a cell-edge SU, our results reveal that the uplink performance is dominated by the average tolerable interference power at primary receivers, while the downlink always behaves like conventional one-way AF relaying and its performance is dominated by the average signal-to-noise ratio (SNR). These important findings provide fresh perspectives for system designers to improve spectral efficiency of secondary users in next-generation broadband spectrum-sharing wireless systems. © 2012 IEEE.

  15. Alternate transmission with half-duplex relaying in MIMO interference relay networks

    KAUST Repository

    Park, Seongho

    2013-12-01

    In this paper, we consider an alternate transmission scheme for a multiple-input multiple-output interference relay channel where multiple sources transmit their own signals to their corresponding destinations via one of two relaying groups alternately every time phase. Each of the relaying groups has arbitrary number of relays, and each relay operates in half-duplex amplify-and-forward mode. In our scheme, the received signals at the relay nodes consist of desired signals and two different interference signals such as the inter-source interferences and the inter-group interferences which are caused by the phase incoherence of relaying. As such, we propose an iterative interference alignment algorithm to mitigate the interferences. We show that our proposed scheme achieves additional degrees of freedom compared to the conventional half-duplex relaying system in the interference relay channels. © 2013 IEEE.

  16. Design of Networked Low-Cost Wireless Noise Measurement Sensor

    Directory of Open Access Journals (Sweden)

    Ilkka KIVELÄ

    2011-02-01

    Full Text Available Environmental noise is considered as one of the big issues in environmental pollutions. Typical noise sources like traffic can have great influence on wellbeing and healthy. In this paper, we report the sensor function design and implementation of a wireless sensor network application for measuring environmental acoustic noise. The sensing system is built on Atmega128 and CC2420 platform. The protocol stack is based on CiNet stack with a global synchronization scheme and supports multi-hop communications. Strict filtering function specified by ITU-R 468 (namely A-weighting is followed. Both the indoor and outdoor test results were compared with a standard sound level meter and showed a less than ± 2.1 dB mean differences in both short-term and long-term measurement. Power consumption has been measured that a single AA-type battery can sustain the application. Comparing to the traditional noise measurement method, the designed wireless sensor network solution is much lower in cost.

  17. Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate

    Directory of Open Access Journals (Sweden)

    Weijia Lei

    2016-07-01

    Full Text Available The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into two groups. One group receives and forwards information, and the other converts the received signal into energy. Beamforming is used by the relay to prevent the eavesdropper from intercepting confidential information. For the purpose of maximizing the secrecy rate, antenna grouping and beamforming vectors are designed. A low complexity scheme of antenna grouping is presented. The simulation results show that the secrecy rate can be significantly improved by arranging part of the antennas for energy harvesting, and part for forwarding and optimizing the beamforming vector at the relay. The antenna grouping scheme significantly reduces the computational complexity at the cost of acceptable performance loss.

  18. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  19. Mobile relays for enhanced broadband connectivity in high speed train systems

    KAUST Repository

    Yaacoub, Elias E.

    2014-09-01

    With the introduction of wireless modems and smart phones, the passenger transport industry is witnessing a high demand to ensure not only the safety of the trains, but also to provide users with Internet access all the time inside the train. When the Mobile Terminal (MT) communicates directly with the Base Station (BS), it will experience a severe degradation in the Quality of Service due to the path loss and shadowing effects as the wireless signal is traveling through the train. In this paper, we study the performance in the case of relays placed on top of each train car. In the proposed approach, these relays communicate with the cellular BS on one hand, and with the MTs inside the train cars on the other hand, using the Long Term Evolution (LTE) cellular technology. A low complexity heuristic LTE radio resource management approach is proposed and compared to the Hungarian algorithm, both in the presence and absence of the relays. The presence of the relays is shown to lead to significant enhancements in the effective data rates of the MTs. In addition, the proposed resource management approach is shown to reach a performance close to the optimal Hungarian algorithm. © 2014 Elsevier B.V.

  20. Precoding Design of MIMO Amplify-and-Forward Communication System With an Energy Harvesting Relay and Possibly Imperfect CSI

    KAUST Repository

    Benkhelifa, Fatma

    2017-03-02

    In this paper, we investigate the simultaneous wireless information and power transfer (SWIPT) in a Multiple-Input Multiple-Output (MIMO) Amplify-and-Forward (AF) relay communication system where the relay is an energy harvesting (EH) node and harvests the energy the signals transmitted from the source. The harvested energy is partially used to forward signals from the source to the destination, and the remaining energy is stored for other usages. The SWIPT in relay-assisted communication is interesting as long as the relay stores energy from the source and the destination receives successfully the data from the source. In this context, we propose to investigate the source and relay precoders that characterize the relationship between the achievable stored energy at the relay and the achievable sourceto- destination rate, namely the rate-stored energy (R-E) tradeo region. First, we consider the ideal scheme where there is the simultaneous operation of the EH and ID receivers at the relay. Then, we consider practical schemes such as the power splitting (PS) and the time switching (TS) that separate the operation of EH and information decoding (ID) receivers over power domain or time domain, respectively. Moreover, we study the case of imperfect channel state information (CSI) at the relay and the destination and characterize its impact on the achievable R-E region. Through the simulation results, we show the eect of the position of the relay and the channel uncertainty on the achievable R-E regions of all the schemes when the used energy at the relay is constant or variable. We also show that, although it provides an outer bound on the achievable rate-energy region in one-hop MIMO systems, the ideal scheme provides only an upper bound on the maximum achievable end-to-end rate and not an outer bound on the R-E region.

  1. Four-Way Relaying in Wireless Cellular Systems

    DEFF Research Database (Denmark)

    Liu, Huaping; Popovski, Petar; De Carvalho, Elisabeth

    2013-01-01

    and the terminals associated with it do not interfere with the other RS, and vice versa. We introduce and analyze a two-phase transmission scheme to serve the four-way traffic pattern defined in this scenario. Each phase consists of combined broadcast and multiple access. We analyze the achievable rate region...

  2. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Donghai Zhu

    2016-01-01

    Full Text Available Wireless Mesh Networks (WMNs have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigms in data transmission for WMNs. In this paper, we develop a novel OpenCoding protocol, which combines the SDN technique with intra-flow network coding for WMNs. Our developed protocol can simplify the deployment and management of the network and improve network performance. In OpenCoding, a controller that works on the control plane makes routing decisions for mesh routers and the hop-by-hop forwarding function is replaced by network coding functions in data plane. We analyze the overhead of OpenCoding. Through a simulation study, we show the effectiveness of the OpenCoding protocol in comparison with existing schemes. Our data shows that OpenCoding outperforms both traditional routing and intra-flow network coding schemes.

  3. Energy efficient circuit design using nanoelectromechanical relays

    Science.gov (United States)

    Venkatasubramanian, Ramakrishnan

    Nano-electromechanical (NEM) relays are a promising class of emerging devices that offer zero off-state leakage and behave like an ideal switch. Recent advances in planar fabrication technology have demonstrated that microelectromechanical (MEMS) scale miniature relays could be manufactured reliably and could be used to build fully functional, complex integrated circuits. The zero leakage operation of relays has renewed the interest in relay based low power logic design. This dissertation explores circuit architectures using NEM relays and NEMS-CMOS heterogeneous integration. Novel circuit topologies for sequential logic, memory, and power management circuits have been proposed taking into consideration the NEM relay device properties and optimizing for energy efficiency and area. In nanoscale electromechanical devices, dispersion forces like Van der Waals' force (vdW) affect the pull-in stability of the relay devices significantly. Verilog-A electromechanical model of the suspended gate relay operating at 1V with a nominal air gap of 5 - 10nm has been developed taking into account all the electrical, mechanical and dispersion effects. This dissertation explores different relay based latch and flip-flop topologies. It has been shown that as few as 4 relay cells could be used to build flip-flops. An integrated voltage doubler based flip flop that improves the performance by 2X by overdriving Vgb has been proposed. Three NEM relay based parallel readout memory bitcell architectures have been proposed that have faster access time, and remove the reliability issues associated with previously reported serial readout architectures. A paradigm shift in design of power switches using NEM relays is proposed. An interesting property of the relay device is that the ON state resistance (Ron) of the NEM relay switch is constant and is insensitive to the gate slew rate. This coupled with infinite OFF state resistance (Roff ) offers significant area and power advantages over CMOS

  4. Opportunistic Relay Selection With Limited Feedback

    KAUST Repository

    Eltayeb, Mohammed E.

    2015-08-01

    Relay selection is a simple technique that achieves spatial diversity in cooperative relay networks. Generally, relay selection algorithms require channel state information (CSI) feedback from all cooperating relays to make a selection decision. This requirement poses two important challenges, which are often neglected in the literature. Firstly, the fed back channel information is usually corrupted by additive noise. Secondly, CSI feedback generates a great deal of feedback overhead (air-time) that could result in significant performance hits. In this paper, we propose a compressive sensing (CS) based relay selection algorithm that reduces the feedback overhead of relay networks under the assumption of noisy feedback channels. The proposed algorithm exploits CS to first obtain the identity of a set of relays with favorable channel conditions. Following that, the CSI of the identified relays is estimated using least squares estimation without any additional feedback. Both single and multiple relay selection cases are considered. After deriving closed-form expressions for the asymptotic end-to-end SNR at the destination and the feedback load for different relaying protocols, we show that CS-based selection drastically reduces the feedback load and achieves a rate close to that obtained by selection algorithms with dedicated error-free feedback. © 1972-2012 IEEE.

  5. Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels

    Directory of Open Access Journals (Sweden)

    Sun YanLindsay

    2009-01-01

    Full Text Available Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on network performance and design. However, cooperative transmission can be vulnerable to selfish behaviors and malicious attacks, especially in its current design. In this paper, we investigate two fundamental questions Does cooperative transmission provide new opportunities to malicious parties to undermine the network performance? Are there new ways to defend wireless networks through physical layer cooperation? Particularly, we study the security vulnerabilities of the traditional cooperative transmission schemes and show the performance degradation resulting from the misbehaviors of relay nodes. Then, we design a trust-assisted cooperative scheme that can detect attacks and has self-healing capability. The proposed scheme performs much better than the traditional schemes when there are malicious/selfish nodes or severe channel estimation errors. Finally, we investigate the advantage of cooperative transmission in terms of defending against jamming attacks. A reduction in link outage probability is achieved.

  6. Performance analysis of opportunistic nonregenerative relaying

    KAUST Repository

    Tourki, Kamel

    2013-01-01

    Opportunistic relaying in cooperative communication depends on careful relay selection. However, the traditional centralized method used for opportunistic amplify-and-forward protocols requires precise measurements of channel state information at the destination. In this paper, we adopt the max-min criterion as a relay selection framework for opportunistic amplify-and-forward cooperative communications, which was exhaustively used for the decode-and-forward protocol, and offer an accurate performance analysis based on exact statistics of the local signal-to-noise ratios of the best relay. Furthermore, we evaluate the asymptotical performance and deduce the diversity order of our proposed scheme. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over Rayleigh fading channels, and we compare the max-min relay selection with their centralized channel state information-based and partial relay selection counterparts.

  7. RoCoMAR: Robots’ Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seokhoon Yoon

    2013-07-01

    Full Text Available In a practical deployment, mobile sensor network (MSN suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots’ Controllable Mobility Aided Routing that uses robotic nodes’ controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  8. Calibration and Evaluation of Fixed and Mobile Relay-Based System Level Simulator

    Directory of Open Access Journals (Sweden)

    Shahid Mumtaz

    2010-01-01

    Full Text Available Future wireless communication systems are expected to provide more stable and higher data rate transmissions in the whole OFDMA networks, but the mobile stations (MSs in the cell boundary experience poor spectral efficiency due to the path loss from the transmitting antenna and interference from adjacent cells. Therefore, satisfying QoS (Quality of Service requirements of each MS at the cell boundary has been an important issue. To resolve this spectral efficiency problem at the cell boundary, deploying relay stations has been actively considered. As multihop/relay has complex interactions between the routing and medium access control decisions, the extent to which analytical expressions can be used to explore its benefits is limited. Consequently, simulations tend to be the preferred way of assessing the performance of relays. In this paper, we evaluate the performance of relay-assisted OFDMA networks by means of system level simulator (SLS. We consistently observed that the throughput is increased and the outage is decreased in the relay-assisted OFDMA network, which is converted to range extension without any capacity penalty, for the realistic range of values of the propagation and other system parameters investigated.

  9. On Amplify-and-Forward Relaying Over Hyper-Rayleigh Fading Channels

    Directory of Open Access Journals (Sweden)

    S. H. Alvi

    2014-12-01

    Full Text Available Relayed transmission holds promise for the next generation of wireless communication systems due to the performance gains it can provide over non-cooperative systems. Recently hyper-Rayleigh fading, which represents fading conditions more severe than Rayleigh fading, has received attention in the context of many practical communication scenarios. Though power allocation for Amplify-and-Forward (AF relaying networks has been studied in the literature, a theoretical analysis of the power allocation problem for hyper-Rayleigh fading channels is a novel contribution of this work. We develop an optimal power allocation (OPA strategy for a dual-hop AF relaying network in which the relay-destination link experiences hyper-Rayleigh fading. A new closed-form expression for the average signal-to-noise ratio (SNR at destination is derived and it is shown to provide a new upper-bound on the average SNR at destination, which outperforms a previously proposed upper-bound based on the well-known harmonic-geometric mean inequality. An OPA across the source and relay nodes, subject to a sum-power constraint, is proposed and it is shown to provide measurable performance gains in average SNR and SNR outage at the destination relative to the case of equal power allocation.

  10. Multi-Destination Cognitive Radio Relay Network with SWIPT and Multiple Primary Receivers

    KAUST Repository

    Al-Habob, Ahmed A.

    2017-05-12

    In this paper, we study the performance of simultaneous wireless information and power transfer (SWIPT) technique in a multi-destination dual-hop underlay cognitive relay network with multiple primary receivers. Information transmission from the secondary source to destinations is performed entirely via a decode- and-forward (DF) relay. The relay is assumed to have no embedded power source and to harvest energy from the source signal using a power splitting (PS) protocol and employing opportunistic scheduling to forward the information to the selected destination. We derive analytical expressions for the outage probability assuming Rayleigh fading channels and considering the energy harvesting efficiency at relay, the source maximum transmit power and primary receivers interference constraints. The system performance is also studied at high signal-to-noise ratio (SNR) values where approximate expressions for the outage probability are provided and analyzed in terms of diversity order and coding gain. Monte-Carlo simulations and some numerical examples are provided to validate the derived expressions and to illustrate the effect of various system parameters on the system performance. In contrast to their conventional counterparts where a multi- destination diversity is usually achieved, the results show that the multi-destination cognitive radio relay networks with the SWIPT technique achieve a constant diversity order of one.

  11. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    CERN Document Server

    Parasuraman, Ramviyas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide red...

  12. The Binary-Symmetric Parallel-Relay Network

    CERN Document Server

    Ong, Lawrence; Kellett, Christopher M

    2010-01-01

    We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, where the relays merely transmit their received signals, achieve the capacity in two ways: with coded transmission at the source and a finite number of relays, or uncoded transmission at the source and a sufficiently large number of relays. On the other hand, decoding relays, where the relays decode the source message, re-encode, and forward it to the destination, achieve the capacity when the number of relays is small.

  13. Alternate transmission relaying based on interference alignment in 3-relay half-duplex MIMO systems

    KAUST Repository

    Park, Seongho

    2012-09-01

    In a half-duplex relaying, the capacity pre-log factor 1/2 is a major drawback in spectral efficiency. This paper proposes a linear precoding/decoding scheme and an alternate relaying protocol in a dual-hop half-duplex system where three relays help the communication between the source and the destination. In our proposed scheme, we consider a phase incoherent method in relays in which the source alternately transmits message signals to the different relays. In addition, we propose a linear interference alignment scheme which can suppress the inter-relay interference resulting from the phase incoherence of relaying. Based on our analysis of degrees of freedom and our simulation results, we show that our proposed scheme achieves additional degrees of freedom compared to the conventional half-duplex relaying. © 2012 IEEE.

  14. Social-Aware Relay Selection for Cooperative Multicast Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Francesco Chiti

    2017-12-01

    Full Text Available The increasing use of social networks such as Facebook, Twitter, and Instagram to share photos, video streaming, and music among friends has generated a huge increase in the amount of data traffic over wireless networks. This social behavior has triggered new communication paradigms such as device-to-device (D2D and relaying communication schemes, which are both considered as strong drivers for the next fifth-generation (5G cellular systems. Recently, the social-aware layer and its relationship to and influence on the physical communications layer have gained great attention as emerging focus points. We focus here on the case of relaying communications to pursue the multicast data dissemination to a group of users forming a social community through a relay node, according to the extension of the D2D mode to the case of device-to-many devices. Moreover, in our case, the source selects the device to act as the relay among different users of the multicast group by taking into account both the propagation link conditions and the relay social-trust level with the constraint of minimizing the end-to-end content delivery delay. An optimization procedure is also proposed in order to achieve the best performance. Finally, numerical results are provided to highlight the advantages of considering the impact of social level on the end-to-end delivery delay in the integrated social–physical network in comparison with the classical relay-assisted multicast communications for which the relay social-trust level is not considered.

  15. Technological advance in relay protection: dangerous tendencies

    OpenAIRE

    V.I. Gurevich

    2012-01-01

    In the article, the modern lines in the development of relay protection are considered: complication, increasing number of functions, use of non-determined and free-programmed logic, use of Ethernet and Wi-Fi communications channels, decreasing reliability. The article highlights the danger of the existing tendencies in relay protection development and the necessity for creation of new lines of relay protection that are independent of the current developers and manufacturers. The article call...

  16. Relay self interference minimisation using tapped filter

    KAUST Repository

    Jazzar, Saleh

    2013-05-01

    In this paper we introduce a self interference (SI) estimation and minimisation technique for amplify and forward relays. Relays are used to help forward signals between a transmitter and a receiver. This helps increase the signal coverage and reduce the required transmitted signal power. One problem that faces relays communications is the leaked signal from the relay\\'s output to its input. This will cause an SI problem where the new received signal at the relay\\'s input will be added with the unwanted leaked signal from the relay\\'s output. A Solution is proposed in this paper to estimate and minimise this SI which is based upon using a tapped filter at the destination. To get the optimum weights for this tapped filter, some channel parameters must be estimated first. This is performed blindly at the destination without the need of any training. This channel parameter estimation method is named the blind-self-interference-channel-estimation (BSICE) method. The next step in the proposed solution is to estimate the tapped filter\\'s weights. This is performed by minimising the mean squared error (MSE) at the destination. This proposed method is named the MSE-Optimum Weight (MSE-OW) method. Simulation results are provided in this paper to verify the performance of BSICE and MSE-OW methods. © 2013 IEEE.

  17. Protective relaying theory and applications

    CERN Document Server

    Elmore, Walter A

    2003-01-01

    Targeting the latest microprocessor technologies for more sophisticated applications in the field of power system short circuit detection, this revised and updated source imparts fundamental concepts and breakthrough science for the isolation of faulty equipment and minimization of damage in power system apparatus. The Second Edition clearly describes key procedures, devices, and elements crucial to the protection and control of power system function and stability. It includes chapters and expertise from the most knowledgeable experts in the field of protective relaying, and describes micropro

  18. Reconfiguration of sustainable thermoelectric generation using wireless sensor network

    DEFF Research Database (Denmark)

    Chen, Min

    2014-01-01

    wireless sensor networks (WSNs), where remotely deployed temperature and voltage sensors as well as latching relays can be organized as a whole to intelligently identify and execute the optimal interconnection of TEM strings. A reconfigurable TEM array with a WSN controller and a maximum power point...

  19. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Jørgensen, Rasmus Nyholm; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  20. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-05-08

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single and multiple relay selection that maximize the sum rate of the secondary network without degrading the quality of service of the primary network by respecting a tolerated interference threshold were formulated. Single relay selection and optimal power allocation for two-way relaying cognitive radio networks using decode-and-forward and amplify-and-forward protocols were studied. Dual decomposition and subgradient methods were used to find the optimal power allocation. The transmission process to exchange two different messages between two transceivers for two-way relaying technique takes place in two time slots. In the first slot, the transceivers transmit their signals simultaneously to the relay. Then, during the second slot the relay broadcasts its signal to the terminals. Moreover, improvement of both spectral and energy efficiency can be achieved compared with the one-way relaying technique. As an extension, a multiple relay selection for both one-way and two-way relaying under cognitive radio scenario using amplify-and-forward were discussed. A strong optimization tool based on genetic and iterative algorithms was employed to solve the 
formulated optimization problems for both single and multiple relay selection, where discrete relay power levels were considered. Simulation results show that the practical and low-complexity heuristic approaches achieve almost the same performance of the optimal relay selection schemes either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity.

  1. 76 FR 72124 - Internet-Based Telecommunications Relay Service Numbering

    Science.gov (United States)

    2011-11-22

    ...] Internet-Based Telecommunications Relay Service Numbering AGENCY: Federal Communications Commission. ACTION... collection associated with the Commission's Internet- Based Telecommunications Relay Service Numbering... notice as an announcement of the effective date of the rules. See Internet-Based Telecommunications Relay...

  2. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  3. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  4. Opportunistic Relay Selection with Cooperative Macro Diversity

    Directory of Open Access Journals (Sweden)

    Yu Chia-Hao

    2010-01-01

    Full Text Available We apply a fully opportunistic relay selection scheme to study cooperative diversity in a semianalytical manner. In our framework, idle Mobile Stations (MSs are capable of being used as Relay Stations (RSs and no relaying is required if the direct path is strong. Our relay selection scheme is fully selection based: either the direct path or one of the relaying paths is selected. Macro diversity, which is often ignored in analytical works, is taken into account together with micro diversity by using a complete channel model that includes both shadow fading and fast fading effects. The stochastic geometry of the network is taken into account by having a random number of randomly located MSs. The outage probability analysis of the selection differs from the case where only fast fading is considered. Under our framework, distribution of the received power is formulated using different Channel State Information (CSI assumptions to simulate both optimistic and practical environments. The results show that the relay selection gain can be significant given a suitable amount of candidate RSs. Also, while relay selection according to incomplete CSI is diversity suboptimal compared to relay selection based on full CSI, the loss in average throughput is not too significant. This is a consequence of the dominance of geometry over fast fading.

  5. Evolution of a Radio Communication Relay System

    Science.gov (United States)

    2013-05-01

    includes two ruggedized relay nodes, to be carried and deployed using deployment forks attached to the flippers of the robots, end-point radios for the...connect to and disconnect from the robot flipper with the use of a quick-release pin. An angular attachment offset between the forks allows the relay

  6. Decode and Zero-Forcing Forward Relaying with Relay Selection in Cognitive Radio Systems

    KAUST Repository

    Park, Kihong

    2014-05-01

    In this paper, we investigate a cognitive radio (CR) relay network with multiple relay nodes that help forwarding the signal of CR users. Best relay selection is considered to take advantage of its low complexity of implementation. When the primary user (PU) is located close to the relay nodes, the performance of the secondary network is severely degraded due to the interference power constraint during the transmission in the second hop. We propose a decode and zero-forcing forward scheme to suppress the interference power at the relay nodes and analyze the statistics of the end-to-end signal-to-noise ratio when the relay nodes are located arbitrarily and experience therefore non-identical Rayleigh fading channels. Numerical results validate our theoretical results and show that our proposed scheme improves the performance of the CR network when the PU is close to the relay nodes. © 2014 IEEE.

  7. On the achievable degrees of freedom of alternate MIMO relaying with multiple AF relays

    KAUST Repository

    Park, Kihong

    2012-03-01

    In this paper, we consider a two-hop relaying network where one source, one destination, and multiple amplify-and-forward (AF) relays equipped with M antennas operate in a half-duplex mode. In order to compensate for the inherent loss of capacity pre-log factor of 1/2 due to half-duplex relaying, we propose a new transmission protocol which combines alternate relaying and inter-relay interference alignment. We prove that the proposed scheme can (i) exploits M degrees of freedom (DOFs) and (ii) perfectly recover the pre-log factor loss if the number of relays is at least six. From our selected numerical results, we show that our proposed scheme gives significant improvement over conventional AF relaying which offers only M/2 DOFs. © 2012 IEEE.

  8. Bilayer expurgated LDPC codes with uncoded relaying

    Directory of Open Access Journals (Sweden)

    Md. Noor-A-Rahim

    2017-08-01

    Full Text Available Bilayer low-density parity-check (LDPC codes are an effective coding technique for decode-and-forward relaying, where the relay forwards extra parity bits to help the destination to decode the source bits correctly. In the existing bilayer coding scheme, these parity bits are protected by an error correcting code and assumed reliably available at the receiver. We propose an uncoded relaying scheme, where the extra parity bits are forwarded to the destination without any protection. Through density evolution analysis and simulation results, we show that our proposed scheme achieves better performance in terms of bit erasure probability than the existing relaying scheme. In addition, our proposed scheme results in lower complexity at the relay.

  9. On Alternate Relaying with Improper Gaussian Signaling

    KAUST Repository

    Gaafar, Mohamed

    2016-06-06

    In this letter, we investigate the potential benefits of adopting improper Gaussian signaling (IGS) in a two-hop alternate relaying (AR) system. Given the known benefits of using IGS in interference-limited networks, we propose to use IGS to relieve the inter-relay interference (IRI) impact on the AR system assuming no channel state information is available at the source. In this regard, we assume that the two relays use IGS and the source uses proper Gaussian signaling (PGS). Then, we optimize the degree of impropriety of the relays signal, measured by the circularity coefficient, to maximize the total achievable rate. Simulation results show that using IGS yields a significant performance improvement over PGS, especially when the first hop is a bottleneck due to weak source-relay channel gains and/or strong IRI.

  10. Exact Performance Analysis of Dual-Hop Semi-Blind AF Relaying over Arbitrary Nakagami-m Fading Channels

    KAUST Repository

    Xia, Minghua

    2011-10-01

    Relay transmission is promising for future wireless systems due to its significant cooperative diversity gain. The performance of dual-hop semi-blind amplify-and-forward (AF) relaying systems was extensively investigated, for transmissions over Rayleigh fading channels or Nakagami- fading channels with integer fading parameter. For the general Nakagami- fading with arbitrary values, the exact closed-form system performance analysis is more challenging. In this paper, we explicitly derive the moment generation function (MGF), probability density function (PDF) and moments of the end-to-end signal-to-noise ratio (SNR) over arbitrary Nakagami- fading channels with semi-blind AF relay. With these results, the system performance evaluation in terms of outage probability, average symbol error probability, ergodic capacity and diversity order, is conducted. The analysis developed in this paper applies to any semi-blind AF relaying systems with fixed relay gain, and two major strategies for computing the relay gain are compared in terms of system performance. All analytical results are corroborated by simulation results and they are shown to be efficient tools to evaluate system performance.

  11. Improving Packet Delivery Performance of Publish/Subscribe Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ernesto García Davis

    2013-01-01

    Full Text Available MQTT-S and CoAP are two protocols able to use the publish/subscribe model in Wireless Sensor Networks (WSNs. The high scalability provided by the publish/subscribe model may incur a high packet loss and therefore requires an efficient reliability mechanism to cope with this situation. The reliability mechanism of MQTT-S and CoAP employs a method which defines a fixed value for the retransmission timeout (RTO. This article argues that this method is not efficient for deploying publish/subscribe in WSN, because it may be unable to recover a packet, therefore resulting in a lower packet delivery ratio (PDR at the subscriber nodes. This article proposes and evaluates an adaptive RTO method, which consists in using a Smooth Round-trip Time and multiplying it by a constant parameter (K. Thanks to this method, the reliability mechanism of MQTT-S and CoAP would be able to react properly to packet loss and would also be lightweight in terms of energy, memory and computing for sensor nodes where these resources are critical. We present a detailed evaluation of the effects of the K value on the calculation of the adaptive RTO method. We also establish the setting for obtaining the highest PDR on the subscriber nodes for single-hop and multi-hop scenarios. The results for single-hop scenario show that use of the appropriate K value for the adaptive RTO method increases the PDR up to 76% for MQTT-S and up to 38% for CoAP when compared with the use of fixed RTO method for both protocols, respectively. Meanwhile the same comparison for multi-hop scenario, the adaptive RTO method increases the PDR up to 36% for MQTT-S and up to 14% for CoAP.

  12. Improving packet delivery performance of publish/subscribe protocols in wireless sensor networks.

    Science.gov (United States)

    Davis, Ernesto García; Calveras, Anna; Demirkol, Ilker

    2013-01-04

    MQTT-S and CoAP are two protocols able to use the publish/subscribe model in Wireless Sensor Networks (WSNs). The high scalability provided by the publish/subscribe model may incur a high packet loss and therefore requires an efficient reliability mechanism to cope with this situation. The reliability mechanism of MQTT-S and CoAP employs a method which defines a fixed value for the retransmission timeout (RTO). This article argues that this method is not efficient for deploying publish/subscribe in WSN, because it may be unable to recover a packet, therefore resulting in a lower packet delivery ratio (PDR) at the subscriber nodes. This article proposes and evaluates an adaptive RTO method, which consists in using a Smooth Round-trip Time and multiplying it by a constant parameter (K). Thanks to this method, the reliability mechanism of MQTT-S and CoAP would be able to react properly to packet loss and would also be lightweight in terms of energy, memory and computing for sensor nodes where these resources are critical. We present a detailed evaluation of the effects of the K value on the calculation of the adaptive RTO method. We also establish the setting for obtaining the highest PDR on the subscriber nodes for single-hop and multi-hop scenarios. The results for single-hop scenario show that use of the appropriate K value for the adaptive RTO method increases the PDR up to 76% for MQTT-S and up to 38% for CoAP when compared with the use of fixed RTO method for both protocols, respectively. Meanwhile the same comparison for multi-hop scenario, the adaptive RTO method increases the PDR up to 36% for MQTT-S and up to 14% for CoAP.

  13. Connectivity Restoration in Wireless Sensor Networks via Space Network Coding.

    Science.gov (United States)

    Uwitonze, Alfred; Huang, Jiaqing; Ye, Yuanqing; Cheng, Wenqing

    2017-04-20

    The problem of finding the number and optimal positions of relay nodes for restoring the network connectivity in partitioned Wireless Sensor Networks (WSNs) is Non-deterministic Polynomial-time hard (NP-hard) and thus heuristic methods are preferred to solve it. This paper proposes a novel polynomial time heuristic algorithm, namely, Relay Placement using Space Network Coding (RPSNC), to solve this problem, where Space Network Coding, also called Space Information Flow (SIF), is a new research paradigm that studies network coding in Euclidean space, in which extra relay nodes can be introduced to reduce the cost of communication. Unlike contemporary schemes that are often based on Minimum Spanning Tree (MST), Euclidean Steiner Minimal Tree (ESMT) or a combination of MST with ESMT, RPSNC is a new min-cost multicast space network coding approach that combines Delaunay triangulation and non-uniform partitioning techniques for generating a number of candidate relay nodes, and then linear programming is applied for choosing the optimal relay nodes and computing their connection links with terminals. Subsequently, an equilibrium method is used to refine the locations of the optimal relay nodes, by moving them to balanced positions. RPSNC can adapt to any density distribution of relay nodes and terminals, as well as any density distribution of terminals. The performance and complexity of RPSNC are analyzed and its performance is validated through simulation experiments.

  14. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  15. Data Relay Board with Protocol for High-Speed, Free-Space Optical Communications

    Science.gov (United States)

    Wright, Malcolm; Clare, Loren; Gould, Gary; Pedyash, Maxim

    2004-01-01

    In a free-space optical communication system, the mitigation of transient outages through the incorporation of error-control methods is of particular concern, the outages being caused by scintillation fades and obscurants. The focus of this innovative technology is the development of a data relay system for a reliable high-data-rate free-spacebased optical-transport network. The data relay boards will establish the link, maintain synchronous connection, group the data into frames, and provide for automatic retransmission (ARQ) of lost or erred frames. A certain Quality of Service (QoS) can then be ensured, compatible with the required data rate. The protocol to be used by the data relay system is based on the draft CCSDS standard data-link protocol Proximity-1, selected by orbiters to multiple lander assets in the Mars network, for example. In addition to providing data-link protocol capabilities for the free-space optical link and buffering the data, the data relay system will interface directly with user applications over Gigabit Ethernet and/or with highspeed storage resources via Fibre Channel. The hardware implementation is built on a network-processor-based architecture. This technology combines the power of a hardware switch capable of data switching and packet routing at Gbps rates, with the flexibility of a software- driven processor that can host highly adaptive and reconfigurable protocols used, for example, in wireless local-area networks (LANs). The system will be implemented in a modular multi-board fashion. The main hardware elements of the data relay system are the new data relay board developed by Rockwell Scientific, a COTS Gigabit Ethernet board for user interface, and a COTS Fibre Channel board that connects to local storage. The boards reside in a cPCI back plane, and can be housed in a VME-type enclosure.

  16. Evolution of a radio communication relay system

    Science.gov (United States)

    Nguyen, Hoa G.; Pezeshkian, Narek; Hart, Abraham; Burmeister, Aaron; Holz, Kevin; Neff, Joseph; Roth, Leif

    2013-05-01

    Providing long-distance non-line-of-sight control for unmanned ground robots has long been recognized as a problem, considering the nature of the required high-bandwidth radio links. In the early 2000s, the DARPA Mobile Autonomous Robot Software (MARS) program funded the Space and Naval Warfare Systems Center (SSC) Pacific to demonstrate a capability for autonomous mobile communication relaying on a number of Pioneer laboratory robots. This effort also resulted in the development of ad hoc networking radios and software that were later leveraged in the development of a more practical and logistically simpler system, the Automatically Deployed Communication Relays (ADCR). Funded by the Joint Ground Robotics Enterprise and internally by SSC Pacific, several generations of ADCR systems introduced increasingly more capable hardware and software for automatic maintenance of communication links through deployment of static relay nodes from mobile robots. This capability was finally tapped in 2010 to fulfill an urgent need from theater. 243 kits of ruggedized, robot-deployable communication relays were produced and sent to Afghanistan to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the evolution of the radio relay technology at SSC Pacific, and then focuses on the latest two stages, the Manually-Deployed Communication Relays and the latest effort to automate the deployment of these ruggedized and fielded relay nodes.

  17. A NEW RELAY DESIGN FOR REACTIVE POWER COMPENSATION AND ECONOMICAL COMPARISION WITH CLASSICAL RELAY

    Directory of Open Access Journals (Sweden)

    Mustafa ŞEKKELİ

    2007-02-01

    Full Text Available In most cases, reactive power compensation is otomatically achieved with reactive power control relay by switching on and off, stationary shunt capasitors to the electrical network. İn this study , a new relay has been designed and developed. İn this method, capasitors which is switched on and of are optimally choosen. İn classical relay , only one capasitor can be added or extructed to the network. But,in designing new relay, 1,2 or 3 capasitor banks which are nearest value for desired inductive reactive power can be optimally choosen. As a result , switching number of capacitor and contactor is reduced minimum value and line is loaded less inductive current , it means that less active power losses. New designed relay has been compared with classical one economically . This relay has been manufactured and approved experimantally.

  18. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  19. Application of a proposed overcurrent relay in radial distribution networks

    Energy Technology Data Exchange (ETDEWEB)

    Conde, A.; Vazquez, E. [Universidad Autonoma de Nuevo Leon, Facultad de Ingenieria Mecanica y Electrica, A.P. 36-F, CU, CP 66450, San Nicolas de los Garza, Nuevo Leon (Mexico)

    2011-02-15

    This paper contains the application criteria and coordination process for a proposed overcurrent relay in a radial power system with feed from one or multiple sources. This relay uses independent functions to detect faults and to calculate the operation time. Also this relay uses a time element function that allows it to reduce the time relay operation, enhancing the backup protection. Some of the proposed approaches improve the sensitivity of the relay. The selection of the best approach in the proposed relay is defined by the needs of the application. The proposed protection can be considered as an additional function protection to conventional overcurrent relays. (author)

  20. Time of arrival based location estimation for cooperative relay networks

    KAUST Repository

    Çelebi, Hasari Burak

    2010-09-01

    In this paper, we investigate the performance of a cooperative relay network performing location estimation through time of arrival (TOA). We derive Cramer-Rao lower bound (CRLB) for the location estimates using the relay network. The analysis is extended to obtain average CRLB considering the signal fluctuations in both relay and direct links. The effects of the channel fading of both relay and direct links and amplification factor and location of the relay node on average CRLB are investigated. Simulation results show that the channel fading of both relay and direct links and amplification factor and location of relay node affect the accuracy of TOA based location estimation. ©2010 IEEE.

  1. Modeling study of the ABS relay valve

    Science.gov (United States)

    Lei, Ming; Lin, Min; Guo, Bin; Luo, Zai; Xu, Weidong

    2011-05-01

    The ABS (anti-lock braking system) relay valve is the key component of anti-lock braking system in most commercial vehicles such as trucks, tractor-trailers, etc. In this paper, structure of ABS relay valve and its work theory were analyzed. Then a mathematical model of ABS relay valve, which was investigated by dividing into electronic part, magnetic part, pneumatic part and mechanical part, was set up. The displacement of spools and the response of pressure increasing, holding, releasing of ABS relay valve were simulated and analyzed under conditions of control pressure 500 KPa, braking pressure 600 KPa, atmospheric pressure 100 KPa and air temperature 310 K. Thisarticle provides reliable theory for improving the performance and efficiency of anti-lock braking system of vehicles.

  2. Developing a Domain Model for Relay Circuits

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth

    2009-01-01

    In this paper we stepwise develop a domain model for relay circuits as used in railway control systems. First we provide an abstract, property-oriented model of networks consisting of components that can be glued together with connectors. This model is strongly inspired by a network model...... for railways madeby Bjørner et.al., however our model is more general: the components can be of any kind and can later be refined to e.g. railway components or circuit components. Then we show how the abstract network model can be refined into an explicit model for relay circuits. The circuit model describes...... the statics as well as the dynamics of relay circuits, i.e. how a relay circuit can be composed legally from electrical components as well as how the components may change state over time. Finally the circuit model is transformed into an executable model, and we show how a concrete circuit can be defined...

  3. LTE-Advanced Relay Technology and Standardization

    CERN Document Server

    Yuan, Yifei

    2013-01-01

    LTE-Advanced Relay Technology and Standardization provides a timely reference work for relay technology with the finalizing of LTE Release 10 specifications. LTE-Advanced is quickly becoming the global standard for 4G cellular communications. The relay technology, as one of the key features in LTE-Advanced, helps not only to improve the system coverage and capacity, but also to save the costs of laying wireline backhaul. As a leading researcher in the field of LTE-Advanced standards, the author provides an in-depth description of LTE-A relay technology, and explains in detail the standard specification and design principles.     Readers from both academic and industrial fields can find sections of interest to them: Sections 2 & 4 could benefit researchers in academia and those who are engaged in exploratory work, while Sections 3 & 4 are more useful to engineers. Dr. Yifei Yuan is the Technical Director at the Standards Department of ZTE Inc.

  4. Partial relay selection in underlay cognitive networks with fixed gain relays

    KAUST Repository

    Hussain, Syed Imtiaz

    2012-05-01

    In a communication system with multiple cooperative relays, selecting the best relay utilizes the available spectrum more efficiently. However, selective relaying poses a different problem in underlay cognitive networks compared to the traditional cooperative networks due to interference thresholds to the primary users. In most cases, a best relay is the one which provides the maximum end-to-end signal to noise ratio (SNR). This approach needs plenty of instantaneous channel state information (CSI). The CSI burden could be reduced by partial relay selection. In this paper, a partial relay selection scheme is presented and analyzed for an underlay cognitive network with fixed gain relays operating in the vicinity of a primary user. The system model is adopted in a way that each node needs minimal CSI to perform its task. The best relay is chosen on the basis of maximum source to relay link SNR which then forwards the message to the destination. We derive closed form expressions for the received SNR distributions, system outage, probability of bit error and average channel capacity of the system. The derived results are confirmed through simulations. © 2012 IEEE.

  5. Performance Analysis of a Two-Hop MIMO Mobile-to-Mobile via Stratospheric-Relay Link Employing Hierarchical Modulation

    Directory of Open Access Journals (Sweden)

    Nikolaos Nomikos

    2013-01-01

    Full Text Available Next generation wireless communication networks intend to take advantage of the integration of terrestrial and aerospace infrastructures. Besides, multiple-input multiple-output (MIMO architecture is the key technology, which has brought the wireless gigabit vision closer to reality. In this direction, high-altitude platforms (HAPs could act as relay stations in the stratosphere transferring information from an uplink to a downlink MIMO channel. This paper investigates the performance of a novel transmission scheme for the delivery of mobile-to-mobile (M-to-M services via a stratospheric relay. It is assumed that the source, relay, and destination nodes are equipped with multiple antennas and that amplify-and-forward (AF relaying is adopted. The performance is analyzed through rigorous simulations in terms of the bit-error rate (BER by using a recently proposed 3D geometry-based reference model in spatially correlated flat-fading MIMO channels, employing a hierarchical broadcast technique and minimum mean square error (MMSE receivers.

  6. Relay Runners Catch The Rays

    CERN Multimedia

    2004-01-01

    Athletes sizzled around CERN on Wednesday 19 May at the 34th annual relay race. On one of the warmest days of the year so far, sunkissed competitors ran for the finish line and then straight for the drinks table. The Shabbys were on fire again, hurtling across the line first in a time of 10 min. 42.6 sec. and making an even stronger claim to being hailed as the traditional winners of the race with their fourth triumph in a row. Also on form were the Lynx Runners who won the Veteran's trophy, continuing their winning ways since 2002 and placing 29th overall. Ildefons Magrans of the ALICE Quarks on the Loose team ran the fastest 1000m in a time of 2 min. 47 sec. Second-placed Charmilles Technologies won the Open category in a time of 11 min. 03 sec., taking the prize for teams whose members work in different departments or who come from outside CERN. The OPALadies won the women's trophy and placed 48th. With 9 trophies up for grabs, more than 300 people in 55 teams ran the fun run, covering distances of 1000m ...

  7. A New Energy-Efficient Topology for Wireless Body Area Networks.

    Science.gov (United States)

    Rostampour, Ameneh; Moghim, Neda; Kaedi, Marjan

    2017-01-01

    Wireless body area networks consist of several devices placed on the human body, sensing vital signs and providing remote recognition of health disorders. Low power consumption is crucial in these networks. A new energy-efficient topology is provided in this paper, considering relay and sensor nodes' energy consumption and network maintenance costs. In this topology design, relay nodes, placed on the cloth, are used to help the sensor nodes forwarding data to the sink. Relay nodes' situation is determined such that the relay nodes' energy consumption merges the uniform distribution. Simulation results show that the proposed method increases the lifetime of the network with nearly uniform distribution of the relay nodes' energy consumption. Furthermore, this technique simultaneously reduces network maintenance costs and continuous replacements of the designer clothing. The proposed method also determines the way by which the network traffic is split and multipath routed to the sink.

  8. Relay selection from an effective capacity perspective

    KAUST Repository

    Yang, Yuli

    2013-09-01

    In this work, we consider a cooperative network where multiple relay nodes having different modulation capabilities assist the end-to-end communication between a source and its destination. Firstly, we evaluate the effective capacity (EC) performance of the network under study. According to the analysis, an EC-based relay selection criterion is proposed. Based on the proposed selection rule and half-duplex decode-and-forward protocol, the activated relays cooperatively help with the packet transmission from the source. At the destination, packet combining is taken into account to improve the quality of service. Compared to the popular scheme, opportunistic relay selection, numerical results are provided to prove the validity and advantages of our proposed scheme in certain scenarios. Moreover, the analysis presented herein offers a convenient tool to the relaying transmission design, specifically on which relay selection scheme should be used as well as how to choose the receiving strategy between with and without packet combining at the destination. © 2013 IEEE.

  9. Coherence time-based cooperative MAC protocol 1 for wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Kim Hyung-jin

    2011-01-01

    Full Text Available Abstract In this article, we address the goal of achieving performance gains under heavy-load and fast fading conditions. CoopMACI protocol proposed in Proceedings of the IEEE International Conference on Communications (ICC, Seoul, Korea, picks either direct path or relay path based on rate comparison to enhance average throughput and delay performances. However, CoopMACI performance deteriorates under fading conditions because of lower direct path or relay path reliability compared to UtdMAC (Agarwal et al. LNCS, 4479, 415-426, 2007. UtdMAC was shown to perform better than CoopMACI in terms of average throughput and delay performances because of improved transmission reliability provided by the backup relay path. Although better than CoopMACI, UtdMAC does not fully benefit from higher throughput relay path (compared to the direct path, since it uses relay path only as a secondary backup path. In this article, we develop a cooperative MAC protocol (termed as instantaneous relay-based cooperative MAC--IrcMAC that uses channel coherence time and estimates signal-to-noise ratio (SNR of source-to-relay, relay-to-destination, and source-to-destination links, to reliably choose between relay path or direct path for enhanced throughput and delay performances. Unique handshaking is used to estimate SNR and single bit feedbacks resolve contentions among relay nodes, which further provides source node with rate (based on SNR information on source-to-destination, source-to-relay, and relay-to-destination links. Simulation results clearly show that IrcMAC significantly outperforms the existing CoopMACI and the UtdMAC protocols in wireless ad hoc network. Results show average throughput improvements of 41% and 64% and average delay improvementd of 98.5% and 99.7% compared with UtdMAC and CoopMACI, respectively.

  10. Performance evaluation and comparative analysis of SubCarrier Modulation Wake-up Radio systems for energy-efficient wireless sensor networks.

    Science.gov (United States)

    Oller, Joaquim; Demirkol, Ilker; Casademont, Jordi; Paradells, Josep; Gamm, Gerd Ulrich; Reindl, Leonhard

    2013-12-19

    Energy-efficient communication is one of the main concerns of wireless sensor networks nowadays. A commonly employed approach for achieving energy efficiency has been the use of duty-cycled operation of the radio, where the node's transceiver is turned off and on regularly, listening to the radio channel for possible incoming communication during its on-state. Nonetheless, such a paradigm performs poorly for scenarios of low or bursty traffic because of unnecessary activations of the radio transceiver. As an alternative technology, Wake-up Radio (WuR) systems present a promising energy-efficient network operation, where target devices are only activated in an on-demand fashion by means of a special radio signal and a WuR receiver. In this paper, we analyze a novel wake-up radio approach that integrates both data communication and wake-up functionalities into one platform, providing a reconfigurable radio operation. Through physical experiments, we characterize the delay, current consumption and overall operational range performance of this approach under different transmit power levels. We also present an actual single-hop WuR application scenario, as well as demonstrate the first true multi-hop capabilities of a WuR platform and simulate its performance in a multi-hop scenario. Finally, by thorough qualitative comparisons to the most relevant WuR proposals in the literature, we state that the proposed WuR system stands out as a strong candidate for any application requiring energy-efficient wireless sensor node communications.

  11. Performance Evaluation and Comparative Analysis of SubCarrier Modulation Wake-up Radio Systems for Energy-Efficient Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Joaquim Oller

    2013-12-01

    Full Text Available Energy-efficient communication is one of the main concerns of wireless sensor networks nowadays. A commonly employed approach for achieving energy efficiency has been the use of duty-cycled operation of the radio, where the node’s transceiver is turned off and on regularly, listening to the radio channel for possible incoming communication during its on-state. Nonetheless, such a paradigm performs poorly for scenarios of low or bursty traffic because of unnecessary activations of the radio transceiver. As an alternative technology, Wake-up Radio (WuR systems present a promising energy-efficient network operation, where target devices are only activated in an on-demand fashion by means of a special radio signal and a WuR receiver. In this paper, we analyze a novel wake-up radio approach that integrates both data communication and wake-up functionalities into one platform, providing a reconfigurable radio operation. Through physical experiments, we characterize the delay, current consumption and overall operational range performance of this approach under different transmit power levels. We also present an actual single-hop WuR application scenario, as well as demonstrate the first true multi-hop capabilities of a WuR platform and simulate its performance in a multi-hop scenario. Finally, by thorough qualitative comparisons to the most relevant WuR proposals in the literature, we state that the proposed WuR system stands out as a strong candidate for any application requiring energy-efficient wireless sensor node communications.

  12. Rate Maximization in MIMO Decode-and-Forward Communications With an EH Relay and Possibly Imperfect CSI

    KAUST Repository

    Benkhelifa, Fatma

    2016-08-29

    In this paper, we investigate the simultaneous wireless information and power transfer (SWIPT) in a multiple-input multiple-output (MIMO) decode-and-forward (DF) relay system where the relay is an energy harvesting (EH) multi-antenna node equipped with an EH receiver and an information decoding (ID) receiver. The relay harvests the energy from the radio frequency (RF) signals sent by the source and uses it to forward the signals to the destination. The main objective in this paper is to maximize the achievable transmission rate of the overall link by optimizing the source/relay precoders. First, we study an upper bound on the maximum achievable rate where we assume that the EH and ID receivers operate simultaneously and have access to the whole power of the received signals. Afterwards, we study two practical schemes, which are the power splitting (PS) and time switching (TS) schemes, where the ID and EH receivers have partial access to the power or duration of the received signals. For each scheme, we have studied the complexity and the performance comparison. In addition, we considered the case of the imperfect channel estimation error and we have observed its impact on the achievable end-to-end rate and the harvested energy at the relay. © 1972-2012 IEEE.

  13. Reactive relay selection in underlay cognitive networks with fixed gain relays

    KAUST Repository

    Hussain, Syed Imtiaz

    2012-06-01

    Best relay selection is a bandwidth efficient technique for multiple relay environments without compromising the system performance. The problem of relay selection is more challenging in underlay cognitive networks due to strict interference constraints to the primary users. Generally, relay selection is done on the basis of maximum end-to-end signal to noise ratio (SNR). However, it requires large amounts of channel state information (CSI) at different network nodes. In this paper, we present and analyze a reactive relay selection scheme in underlay cognitive networks where the relays are operating with fixed gains near a primary user. The system model minimizes the amount of CSI required at different nodes and the destination selects the best relay on the basis of maximum relay to destination SNR. We derive close form expressions for the received SNR statistics, outage probability, bit error probability and average channel capacity of the system. Simulation results are also presented to confirm the validity of the derived expressions. © 2012 IEEE.

  14. A distributed monitoring system for photovoltaic arrays based on a two-level wireless sensor network

    Science.gov (United States)

    Su, F. P.; Chen, Z. C.; Zhou, H. F.; Wu, L. J.; Lin, P. J.; Cheng, S. Y.; Li, Y. F.

    2017-11-01

    In this paper, a distributed on-line monitoring system based on a two-level wireless sensor network (WSN) is proposed for real time status monitoring of photovoltaic (PV) arrays to support the fine management and maintenance of PV power plants. The system includes the sensing nodes installed on PV modules (PVM), sensing and routing nodes installed on combiner boxes of PV sub-arrays (PVA), a sink node and a data management centre (DMC) running on a host computer. The first level WSN is implemented by the low-cost wireless transceiver nRF24L01, and it is used to achieve single hop communication between the PVM nodes and their corresponding PVA nodes. The second level WSN is realized by the CC2530 based ZigBee network for multi-hop communication among PVA nodes and the sink node. The PVM nodes are used to monitor the PVM working voltage and backplane temperature, and they send the acquired data to their PVA node via the nRF24L01 based first level WSN. The PVA nodes are used to monitor the array voltage, PV string current and environment irradiance, and they send the acquired and received data to the DMC via the ZigBee based second level WSN. The DMC is designed using the MATLAB GUIDE and MySQL database. Laboratory experiment results show that the system can effectively acquire, display, store and manage the operating and environment parameters of PVA in real time.

  15. A system for ubiquitous fall monitoring at home via a wireless sensor network.

    Science.gov (United States)

    Fernandez-Luque, Francisco J; Zapata, Juan; Ruiz, Ramon

    2010-01-01

    Accidental falls of our elderly, and physical injuries resulting, represent a major health and economic. Falls are the most common causes of serious injuries and a major health threats in the stratum of older population. Early detection of a fall is a key factor when trying to provide adequate care to the elderly person who has suffered an accident at home. In this paper, we present a support system for detecting falls of an elder person by a static wireless nonintrusive sensorial infrastructure based on heterogenous sensor nodes. This previous infrastructure, named AID (Alarm Intelligent Device), is an AAL (Ambient Assisted Living) system that allows to infer a potential fall. We have developed, different to other contributions, a specific low-power multi-hop network consists of nodes (Motes) that wirelessly communicate to each other and are capable of hopping radio messages to a base station where they are passed to a PC (or other possible client). The goal of this project is 1) to provide alerts to caregivers in the event of an accident, acute illness or strange (possibly dangerous) activities, and 2) to enable that authorized and authenticated caregivers by means of a itinerant wearable mote can be inserted into mesh and interact with it. In this paper, we describe an ubiquitous assistential monitoring system at home.

  16. Cooperative AF Relaying in Spectrum-Sharing Systems: Performance Analysis under Average Interference Power Constraints and Nakagami-m Fading

    KAUST Repository

    Xia, Minghua

    2012-06-01

    Since the electromagnetic spectrum resource becomes more and more scarce, improving spectral efficiency is extremely important for the sustainable development of wireless communication systems and services. Integrating cooperative relaying techniques into spectrum-sharing cognitive radio systems sheds new light on higher spectral efficiency. In this paper, we analyze the end-to-end performance of cooperative amplify-and-forward (AF) relaying in spectrum-sharing systems. In order to achieve the optimal end-to-end performance, the transmit powers of the secondary source and the relays are optimized with respect to average interference power constraints at primary users and Nakagami-$m$ fading parameters of interference channels (for mathematical tractability, the desired channels from secondary source to relay and from relay to secondary destination are assumed to be subject to Rayleigh fading). Also, both partial and opportunistic relay-selection strategies are exploited to further enhance system performance. Based on the exact distribution functions of the end-to-end signal-to-noise ratio (SNR) obtained herein, the outage probability, average symbol error probability, diversity order, and ergodic capacity of the system under study are analytically investigated. Our results show that system performance is dominated by the resource constraints and it improves slowly with increasing average SNR. Furthermore, larger Nakagami-m fading parameter on interference channels deteriorates system performance slightly. On the other hand, when interference power constraints are stringent, opportunistic relay selection can be exploited to improve system performance significantly. All analytical results are corroborated by simulation results and they are shown to be efficient tools for exact evaluation of system performance.

  17. A genetic algorithm for multiple relay selection in two-way relaying cognitive radio networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-09-01

    In this paper, we investigate a multiple relay selection scheme for two-way relaying cognitive radio networks where primary users and secondary users operate on the same frequency band. More specifically, cooperative relays using Amplifyand- Forward (AF) protocol are optimally selected to maximize the sum rate of the secondary users without degrading the Quality of Service (QoS) of the primary users by respecting a tolerated interference threshold. A strong optimization tool based on genetic algorithm is employed to solve our formulated optimization problem where discrete relay power levels are considered. Our simulation results show that the practical heuristic approach achieves almost the same performance of the optimal multiple relay selection scheme either with discrete or continuous power distributions. Copyright © 2013 by the Institute of Electrical and Electronic Engineers, Inc.

  18. Distance relay performance in future converter dominated power systems

    DEFF Research Database (Denmark)

    Sarkar, Moumita; Jia, Jundi; Yang, Guangya

    2017-01-01

    to 1.1-1.25 times of its nominal value. Low availability of short circuit power can cause many challenges such as misoperation of distance relays. The aim of this paper is to investigate the effect of converter dominated systems on performance of distance relays. Backup functionality of the distance...... relay is major concern as miscoordination of backup relays in case of cascading faults can lead to severe stress in system, which can develop into blackout. In this paper, response of relays in traditional system is compared with response of relays in low short-circuit-current power systems. Impact...

  19. Wireless Communications

    Science.gov (United States)

    1991-01-01

    A technology utilization project led to the commercial adaptation of a Space Shuttle Orbiter wireless infrared voice communications system. The technology was adapted to a LAN system by Wilton Industries, one of the participants. Because the system is cable-free, installation charges are saved, and it can be used where cable is impractical. Resultant products include the IRplex 6000. Transceivers can be located anywhere and can include mobile receivers. The system provides wireless LAN coverage up to 44,000 square feet. applications include stock exchange communications, trade shows, emergency communications, etc.

  20. Relay-supporting Archives: Requirements and Progress

    Directory of Open Access Journals (Sweden)

    Greg Janée

    2009-06-01

    Full Text Available Normal 0 We characterize long-term preservation of digital content as an extended relay in time, in which repeated handoffs of information occur independently at every architectural layer: at the physical layer, where bits are handed off between storage systems; at the logical layer, where digital objects are handed off between repository systems; and at the administrative layer, where collections of objects and relationships are handed off between archives, curators, and institutions.  We examine the support of current preservation technologies for these handoffs, note shortcomings, and argue that some modest improvements would result in a "relay-supporting" preservation infrastructure, one that provides a baseline level of preservation by mitigating the risk of fundamental information loss.  Finally, we propose a series of tests to validate a relay-supporting infrastructure, including a second Archive Ingest and Handling Test (AIHT.

  1. Back-up Perlindungan Relay Jarak Zona Kedua oleh Directional Overcurrent Relays dengan Combined Curves

    Directory of Open Access Journals (Sweden)

    Ariq Arsya Nanda

    2017-01-01

    Full Text Available Dalam makalah ini, pendekatan baru untuk simultan pengaturan jarak dan relay arus lebih terarah. Ketika skema perlindungan garis terdiri dari relay jarak dan relay arus lebih terarah pengaturan relay harus dihitung mengingat kedua relay. Terpisah perhitungan estafet akan menyebabkan hilangnya selektivitas. Jika kedua zona waktu pengaturan adalah tetap, penentuan otomatis dari pengaturan bisa menyebabkan situasi yang tidak sesuai, serta  menemukan satu set selektif pengaturan. Jadi zona waktu kedua harus diubah secara manual sampai masalah optimasi layak. Dalam metode ini, yang terbaik pengaturan untuk zona kedua yang membuat selektifitas dalam back-up dengan relay arus dapat menyebabkan waktu yang tidak menguntungkan dari zona kedua. Dalam metode yang diusulkan, bukannya mengubah waktu zona kedua, bentuk directional arus cadangan yang akan dirubah dengan lokasi gangguan dan saat ini. Ide mengatur proteksi rele arus dalam waktu respon pada arus kesalahan yang lebih tinggi dicapai dengan menggunakan perangkat perlindungan yang universal dengan platform perangkat lunak yang dapat memfasilitasi merancang waktu saat kurva karakteristik yang berbeda bentuk. Hasil simulasi menunjukkan efektivitas metode ini yaitu dengan mengkombinasi kurva rele arah arus lebih dengan relay jarak sehingga mendapatkan koordinasi yang tepat.

  2. CERN Relay Race: information for drivers

    CERN Multimedia

    2012-01-01

    The CERN relay race will take place around the Meyrin site on Thursday, 24 May starting at 12.15. If possible, please avoid driving on the site during this 20-minute period. If you do meet runners while driving your car, please STOP until they have all passed. In addition, there will be a Nordic Walking event which will finish around 12.50. This should not block the roads, but please drive carefully during this time. Thank you for your cooperation. Details on how to register your team for the relay race can be found here.

  3. Modelling and Verification of Relay Interlocking Systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Bliguet, Marie Le; Kjær, Andreas

    2010-01-01

    This paper describes how relay interlocking systems as used by the Danish railways can be formally modelled and verified. Such systems are documented by circuit diagrams describing their static layout. It is explained how to derive a state transition system model for the dynamic behaviour of a re...... of a relay system from such diagrams. Safety properties are identified and formalised as LTL formulae. Model checking is finally used to verify that a model satisfies the safety properties. The method is tested for an existing station in Denmark....

  4. Energy neutral and low power wireless communications

    Science.gov (United States)

    Orhan, Oner

    Wireless sensor nodes are typically designed to have low cost and small size. These design objectives impose restrictions on the capacity and efficiency of the transceiver components and energy storage units that can be used. As a result, energy becomes a bottleneck and continuous operation of the sensor network requires frequent battery replacements, increasing the maintenance cost. Energy harvesting and energy efficient transceiver architectures are able to overcome these challenges by collecting energy from the environment and utilizing the energy in an intelligent manner. However, due to the nature of the ambient energy sources, the amount of useful energy that can be harvested is limited and unreliable. Consequently, optimal management of the harvested energy and design of low power transceivers pose new challenges for wireless network design and operation. The first part of this dissertation is on energy neutral wireless networking, where optimal transmission schemes under different system setups and objectives are investigated. First, throughput maximization for energy harvesting two-hop networks with decode-and-forward half-duplex relays is studied. For a system with two parallel relays, various combinations of the following four transmission modes are considered: Broadcast from the source, multi-access from the relays, and successive relaying phases I and II. Next, the energy cost of the processing circuitry as well as the transmission energy are taken into account for communication over a broadband fading channel powered by an energy harvesting transmitter. Under this setup, throughput maximization, energy maximization, and transmission completion time minimization problems are studied. Finally, source and channel coding for an energy-limited wireless sensor node is investigated under various energy constraints including energy harvesting, processing and sampling costs. For each objective, optimal transmission policies are formulated as the solutions of a

  5. Wireless sensor networks distributed consensus estimation

    CERN Document Server

    Chen, Cailian; Guan, Xinping

    2014-01-01

    This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investiga

  6. Outage performance of two-way DF relaying systems with a new relay selection metric

    KAUST Repository

    Hyadi, Amal

    2012-04-01

    This paper investigates a new constrained relay selection scheme for two-way relaying systems where two end terminals communicate simultaneously via a relay. The introduced technique is based on the maximization of the weighted sum rate of both users. To evaluate the performance of the proposed system, the outage probability is derived in a general case (where an arbitrary channel is considered), and then over independently but not necessarily identically distributed (i.n.i.d.) Rayleigh fading channels. The analytical results are verified through simulations. © 2012 IEEE.

  7. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    Science.gov (United States)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  8. EFFECTS OF THE NUMBER OF RELAY ANTENNAS AND RELAY-POWER ON MIMO PRECODED TWO-WAY RELAYING

    Directory of Open Access Journals (Sweden)

    S.S. Rajeshwari

    2011-06-01

    Full Text Available In this treatise a two-way Amplify and Forward (AF relay-aided system is considered, which employs the so-called Arithmetic Sum of Average Bit Error Rate (ASABER based MIMO precoding technique. The two-way AF relay system is comprised of the pair of transceiver nodes S1 and S2, and the Relay Node (RN R, where each node is equipped with N1, N2 and Nr antennas, respectively. We study the effects of varying Nr for fixed values of N1 and N2, and as well as the effects of having a fixed transmission power at the RN on the achievable ASABER performance. Based on our intensive simulation campaign, we infer that the attainable diversity order is increased approximately by Nr − min (N1, N2, whenever Nr assumes a value higher than min (N1, N2 for fixed N1, N2 values. However, this is observation is only valid for relay power pr ≥ (p1, p2, where p1 and p2 are the transmit power constraints imposed on the sources S1 and S2, respectively. We also observe that the ASABER MIMO precoder’s BER curve exhibits an error floor for pr ≤ (p1, p2.

  9. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  10. Adaptive relaying for ground fault protection of a distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Sachdev, M.S.; Sidhu, T.S.; Talukdar, B.K.

    1995-12-31

    With the advent of digital technology and microprocessor-based relays, it is possible to continuously monitor a power network, analyze it in real time, and change the relay settings to those most suitable at that time, thereby achieving improved protection of the network. This approach, known as adaptive relaying, was applied to the Saskatoon distribution network. This paper describes the software modules developed for setting ground fault overcurrent relays in the adaptive relay protection system. The major task in this system was the on-line coordination of relays, as most faults in a distribution system are of the single-phase to ground type and current unbalance due to single-phase loading contributes to the complexity of relay coordination. The modules served for network topology detection, state estimation, fault analysis, and relay setting and coordination. The paper also presents results of a study of the proposed adaptive ground fault protection scheme using a model distribution network.

  11. Dynamic Relaying in 3GPP LTE-Advanced Networks

    Directory of Open Access Journals (Sweden)

    Van Phan Vinh

    2009-01-01

    Full Text Available Relaying is one of the proposed technologies for LTE-Advanced networks. In order to enable a flexible and reliable relaying support, the currently adopted architectural structure of LTE networks has to be modified. In this paper, we extend the LTE architecture to enable dynamic relaying, while maintaining backward compatibility with LTE Release 8 user equipments, and without limiting the flexibility and reliability expected from relaying. With dynamic relaying, relays can be associated with base stations on a need basis rather than in a fixed manner which is based only on initial radio planning. Proposals are also given on how to further improve a relay enhanced LTE network by enabling multiple interfaces between the relay nodes and their controlling base stations, which can possibly be based on technologies different from LTE, so that load balancing can be realized. This load balancing can be either between different base stations or even between different networks.

  12. Relay communications strategies for Mars exploration through 2020

    Science.gov (United States)

    Edwards, Charles D., Jr.; Arnold, B.; DePaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2005-01-01

    In this paper we will examine NASA's strategy for relay communications support of missions planned for this decade, and discuss options for longer-term relay network evolution in support of second-decade missions.

  13. Two-Hop Secure Communication Using an Untrusted Relay

    National Research Council Canada - National Science Library

    He, Xiang; Yener, Aylin

    2009-01-01

    .... Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable...

  14. Protocols for Relay-Assisted Free-Space Optical Systems

    CERN Document Server

    Chatzidiamantis, Nestor D; Kriezis, Emmanouil E; Karagiannidis, George K; Schober, Robert

    2011-01-01

    We investigate transmission protocols for relay-assisted free-space optical (FSO) systems, when multiple parallel relays are employed and there is no direct link between the source and the destination. As alternatives to all-active FSO relaying, where all the available relays transmit concurrently, we propose schemes that select only a single relay to participate in the communication between the source and the destination in each transmission slot. This selection is based on the channel state information (CSI) obtained either from all or from some of the FSO links. Thus, the need for synchronizing the relays' transmissions is avoided and the slowly varying nature of the atmospheric channel is exploited. For both relay selection and all-active relaying, novel closed-form expressions for their outage performance are derived, assuming the versatile Gamma-Gamma channel model. Furthermore, based on the derived analytical results, the problem of allocating the optical power resources to the FSO links is addressed, ...

  15. Improper Signaling for Virtual Full-Duplex Relay Systems

    KAUST Repository

    Gaafar, Mohamed

    2017-02-14

    Virtual full-duplex (VFD) is a powerful solution to compensate the rate loss of half-duplex relaying without the need to full-duplex capable nodes. Inter-relay interference (IRI) challenges the operation of VFD relaying systems. Recently, improper signaling is employed at both relays of the VFD to mitigate the IRI by imposing the same signal characteristics for both relays. To further boost the achievable rate performance, asymmetric time sharing VFD relaying system is adopted with different improper signals at the half-duplex relays. The joint tuning of the three design parameters improves the achievable rate performance at different ranges of IRI and different relays locations. Extensive simulation results are presented and analyzed to show the achievable rate gain of the proposed system and understand the system behavior.

  16. Capacity gains of buffer-aided moving relays

    KAUST Repository

    Zafar, Ammar

    2017-03-14

    This work investigates the gain due to reduction in path loss by deploying buffer-aided moving relaying. In particular, the increase in gain due to moving relays is studied for dual-hop broadcast channels and the bidirectional relay channel. It is shown that the exploited gains in these channels due to buffer-aided relaying can be enhanced by utilizing the fact that a moving relay can communicate with the terminal closest to it and store the data in the buffer and then forward the data to the intended destination when it comes in close proximity with the destination. Numerical results show that for both the considered channels the achievable rates are increased as compared to the case of stationary relays. Numerical results also show that more significant increase in performance is seen when the relay moves to-and-fro between the source and the relay.

  17. A Model for QoS - Aware Wireless Communication in Hospitals.

    Science.gov (United States)

    Alavikia, Zahra; Khadivi, Pejman; Hashemi, Masoud Reza

    2012-01-01

    In the recent decade, research regarding wireless applications in electronic health (e-Health) services has been increasing. The main benefits of using wireless technologies in e-Health applications are simple communications, fast delivery of medical information, reducing treatment cost and also reducing the medical workers' error rate. However, using wireless communications in sensitive healthcare environment raises electromagnetic interference (EMI). One of the most effective methods to avoid the EMI problem is power management. To this end, some of methods have been proposed in the literature to reduce EMI effects in health care environments. However, using these methods may result in nonaccurate interference avoidance and also may increase network complexity. To overcome these problems, we introduce two approaches based on per-user location and hospital sectoring for power management in sensitive healthcare environments. Although reducing transmission power could avoid EMI, it causes a number of successful message deliveries to the access point to decrease and, hence, the quality of service requirements cannot be meet. In this paper, we propose the use of relays for decreasing the probability of outage in the aforementioned scenario. Relay placement is the main factor to enjoy the usefulness of relay station benefits in the network and, therefore, we use the genetic algorithm to compute the optimum positions of a fixed number of relays. We have considered delay and maximum blind point coverage as two main criteria in relay station problem. The performance of the proposed method in outage reduction is investigated through simulations.

  18. Preamble-based channel estimation in single-relay networks using FBMC/OQAM

    Science.gov (United States)

    Mavrokefalidis, Christos; Kofidis, Eleftherios; Rontogiannis, Athanasios A.; Theodoridis, Sergios

    2014-12-01

    Preamble-based channel estimation in filter bank-based multicarrier (FBMC) systems using offset quadrature amplitude modulation (OQAM) has been extensively studied in the last few years, due to the many advantages this modulation scheme can offer over cyclic prefix (CP)-based orthogonal frequency division multiplexing (OFDM) and in view of the interesting challenges posed on the channel estimator by the interference effect inherent in such an FBMC system. In particular, preambles of short duration and of both the block ( full) and comb ( sparse) types were designed so as to minimize the channel estimation mean squared error (MSE) subject to a given transmit energy. In the light of the important role that relay-based cooperative networks are expected to play in future wireless communication systems, it is of interest to consider FBMC/OQAM, and in particular questions associated to preamble-based channel estimation, in such a context as well. The goal of this paper is to address these problems and come up with optimal solutions that extend existing results in a single relay-based cooperative network. Both low and medium frequency selective channels are considered. In addition to optimal preamble and estimator design, the equalization/detection task is studied, shedding light to a relay-generated interference effect and proposing a simple way to come over it. The reported simulation results corroborate the analysis and reveal interesting behavior with respect to channel frequency selectivity and signal-to-noise ratio.

  19. Connectivity, Coverage and Placement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chuan Heng Foh

    2009-09-01

    Full Text Available Wireless communication between sensors allows the formation of flexible sensor networks, which can be deployed rapidly over wide or inaccessible areas. However, the need to gather data from all sensors in the network imposes constraints on the distances between sensors. This survey describes the state of the art in techniques for determining the minimum density and optimal locations of relay nodes and ordinary sensors to ensure connectivity, subject to various degrees of uncertainty in the locations of the nodes.

  20. relay coordination in the protection of radially-connected power

    African Journals Online (AJOL)

    Over travel of the induction disk or solid- state relay after the fault current has been interrupted is provided for by 0.1s. • A safety margin of 0.15s to compensate for possible deviations in calculated fault cur- rents, relay tap selection, relay operating time, and current transformer ratio errors. 2.2.1. Time grading using relays ...

  1. Scalable DeNoise-and-Forward in Bidirectional Relay Networks

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Krigslund, Rasmus; Popovski, Petar

    2010-01-01

    In this paper a scalable relaying scheme is proposed based on an existing concept called DeNoise-and-Forward, DNF. We call it Scalable DNF, S-DNF, and it targets the scenario with multiple communication flows through a single common relay. The idea of the scheme is to combine packets at the relay...

  2. 77 FR 1039 - Internet-Based Telecommunications Relay Service Numbering

    Science.gov (United States)

    2012-01-09

    ... COMMISSION 47 CFR Part 64 Internet-Based Telecommunications Relay Service Numbering AGENCY: Federal... rules that govern access to toll-free numbers by users of Internet- based Telecommunications Relay... an impact on any rules of particular applicability. Subject: Internet-Based Telecommunications Relay...

  3. Dynamic Relaying in 3GPP LTE-Advanced Networks

    DEFF Research Database (Denmark)

    Teyeb, Oumer Mohammed; Van Phan, Vinh; Redana, Simone

    2009-01-01

    Relaying is one of the proposed technologies for LTE-Advanced networks. In order to enable a flexible and reliable relaying support, the currently adopted architectural structure of LTE networks has to be modified. In this paper, we extend the LTE architecture to enable dynamic relaying, while ma...

  4. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Science.gov (United States)

    2011-04-04

    ... COMMISSION 47 CFR Parts 1 and 64 Contributions to the Telecommunications Relay Service Fund AGENCY: Federal...- interconnected VoIP service to participate in and contribute to the Telecommunications Relay Services (TRS) Fund... summary of the Commission's Contributions to the Telecommunications Relay Service Fund, Notice of Proposed...

  5. protective relay studies for the nigerian national electric 330 kv ...

    African Journals Online (AJOL)

    user

    1985-09-01

    Sep 1, 1985 ... I = Current flow in line during indicated, fault. LBB = Local Breaker Backup Scheme. T2. = Time delay setting for the operation of the zone 2 element of distance relay. T3. = Time delay setting for the operation of the zone 3 element of distance relay. Z1 PR = Zone 1 element reach of distance relay in primary ...

  6. First Things First: Internet Relay Chat Openings.

    Science.gov (United States)

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  7. Relay cross metathesis reactions of vinylphosphonates

    Directory of Open Access Journals (Sweden)

    Raj K. Malla

    2014-08-01

    Full Text Available Dimethyl (β-substituted vinylphosphonates do not readily undergo cross metathesis reactions with Grubbs catalyst and terminal alkenes. However, the corresponding mono- or diallyl vinylphosphonate esters undergo facile cross metathesis reactions. The improved reactivity is attributed to a relay step in the cross metathesis reaction mechanism.

  8. SWIPT in Multiuser MIMO Decode-and-Forward Relay Broadcasting Channel with Energy Harvesting Relays

    KAUST Repository

    Benkhelifa, Fatma

    2017-02-09

    In this paper, we consider a multiuser multiple- input multiple-output (MIMO) decode-and-forward (DF) relay broadcasting channel (BC) with single source, multiple energy harvesting relays and multiple destinations. Since the end-to-end sum rate maximization problem is intractable, we tackle a simplified problem where we maximize the sum of the harvested energy at the relays, we employ the block diagonalization (BD) procedure at the source, and we mitigate the interference between the relay- destination channels. The interference mitigation at the destinations is managed in two ways: either to fix the interference covariance matrices at the destination and update them at each iteration until convergence, or to cancel the interference using an algorithm similar to the BD method. We provide numerical results to show the relevance of our proposed solution.

  9. A low complexity algorithm for multiple relay selection in two-way relaying Cognitive Radio networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-06-01

    In this paper, a multiple relay selection scheme for two-way relaying cognitive radio network is investigated. We consider a cooperative Cognitive Radio (CR) system with spectrum sharing scenario using Amplify-and-Forward (AF) protocol, where licensed users and unlicensed users operate on the same frequency band. The main objective is to maximize the sum rate of the unlicensed users allowed to share the spectrum with the licensed users by respecting a tolerated interference threshold. A practical low complexity heuristic approach is proposed to solve our formulated optimization problem. Selected numerical results show that the proposed algorithm reaches a performance close to the performance of the optimal multiple relay selection scheme either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity. In addition, these results show that our proposed scheme significantly outperforms the single relay selection scheme. © 2013 IEEE.

  10. Optimal relay selection and power allocation for cognitive two-way relaying networks

    KAUST Repository

    Pandarakkottilil, Ubaidulla

    2012-06-01

    In this paper, we present an optimal scheme for power allocation and relay selection in a cognitive radio network where a pair of cognitive (or secondary) transceiver nodes communicate with each other assisted by a set of cognitive two-way relays. The secondary nodes share the spectrum with a licensed primary user (PU), and each node is assumed to be equipped with a single transmit/receive antenna. The interference to the PU resulting from the transmission from the cognitive nodes is kept below a specified limit. We propose joint relay selection and optimal power allocation among the secondary user (SU) nodes achieving maximum throughput under transmit power and PU interference constraints. A closed-form solution for optimal allocation of transmit power among the SU transceivers and the SU relay is presented. Furthermore, numerical simulations and comparisons are presented to illustrate the performance of the proposed scheme. © 2012 IEEE.

  11. Iterative Relay Scheduling with Hybrid ARQ under Multiple User Equipment (Type II) Relay Environments

    KAUST Repository

    Nam, Sung Sik

    2018-01-09

    In this work, we propose an iterative relay scheduling with hybrid ARQ (IRS-HARQ) scheme which realizes fast jump-in/successive relaying and subframe-based decoding under the multiple user equipment (UE) relay environments applicable to the next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed IRS-HARQ aims to increase the achievable data rate by iteratively scheduling a relatively better UE relay closer to the end user in a probabilistic sense, provided that the relay-to-end user link should be operated in an open-loop and transparent mode. The latter is due to the fact that not only there are no dedicated control channels between the UE relay and the end user but also a new cell is not created. Under this open-loop and transparent mode, our proposed protocol is implemented by partially exploiting the channel state information based on the overhearing mechanism of ACK/NACK for HARQ. Further, the iterative scheduling enables UE-to-UE direct communication with proximity that offers spatial frequency reuse and energy saving.

  12. Relay Precoder Optimization in MIMO-Relay Networks With Imperfect CSI

    KAUST Repository

    Pandarakkottilil, Ubaidulla

    2011-11-01

    In this paper, we consider robust joint designs of relay precoder and destination receive filters in a nonregenerative multiple-input multiple-output (MIMO) relay network. The network consists of multiple source-destination node pairs assisted by a MIMO-relay node. The channel state information (CSI) available at the relay node is assumed to be imperfect. We consider robust designs for two models of CSI error. The first model is a stochastic error (SE) model, where the probability distribution of the CSI error is Gaussian. This model is applicable when the imperfect CSI is mainly due to errors in channel estimation. For this model, we propose robust minimum sum mean square error (SMSE), MSE-balancing, and relay transmit power minimizing precoder designs. The next model for the CSI error is a norm-bounded error (NBE) model, where the CSI error can be specified by an uncertainty set. This model is applicable when the CSI error is dominated by quantization errors. In this case, we adopt a worst-case design approach. For this model, we propose a robust precoder design that minimizes total relay transmit power under constraints on MSEs at the destination nodes. We show that the proposed robust design problems can be reformulated as convex optimization problems that can be solved efficiently using interior-point methods. We demonstrate the robust performance of the proposed design through simulations. © 2011 IEEE.

  13. Joint Resource Allocation in Secure OFDMA-Based Networks Taking a Base Station as a Two-Way Relay

    Directory of Open Access Journals (Sweden)

    Ning Du

    2017-05-01

    Full Text Available Due to the broadcast nature of wireless media, all nodes in the coverage of a transmitter are capable of capturing its signals, thus wireless transmission is sensitive to wiretapping. Several existing schemes place an emphasis on secrecy rate improvement, under the protocols of amplify-and-forward or decode-and-forward, when there are only relay users in the network. We set up a novel communication model in which normal and two-way relay users coexist in the same cell, taking the base station as a relay. Our objective is to maximize the total secrecy rate, taking subcarrier pairing, subcarrier assignment and power allocation into account, when there is one eavesdropper in one cell of the cellular network. Although this problem is very intricate, we reformulate it as a convex optimization problem by means of Lagrange duality. In order to reduce the computational complexity, equal power allocation is proposed. Lastly, the experimental results show the proposed resource allocation scheme can obtain a higher secrecy rate than traditional schemes.

  14. Medium access control and hardware prototype designs for low-energy wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Kohvakka, M.

    2009-07-01

    A Wireless Sensor Network (WSN) is an emerging technology consisting of small, cheap, and ultra-low energy sensor nodes, which cooperatively monitor physical quantities, actuate, and perform data processing tasks. A deployment may comprise thousands of randomly distributed autonomous nodes, which must self-configure and create a multi-hop network topology.This thesis focuses on low-energy WSNs targeting to long network lifetime. The main research problem is the combination of adaptive and scalable multi-hop networking with constrained energy budget, processing power, and communication bandwidth. The research problem is approached by energy-efficient protocols and low-power sensor node platforms. The main contribution of this thesis is an energy-efficient Medium Access Control (MAC) design for TUTWSN (Tampere University of Technology Wireless Sensor Network). The design comprises channel access and networking mechanisms, which specify data exchange, link synchronization, network self-configuration, and neighbor discovery operations. The second outcome are several low-power sensor node platforms, which have been designed and implemented to evaluate the performance of the MAC design and hardware components in real deployments. The third outcome are the performance models and analysis of several MAC designs including TUTWSN, IEEE 802.15.4, and the most essential research proposals.The results and conclusion of this Thesis indicate that it is possible to implement multi-hop WSNs in harsh and dynamic operation conditions with years of lifetime using current low-cost components and batteries. Energy analysis results indicate that the lowest energy consumption is achieved by using simple and high data-rate transceivers. It is also critical to minimize sleep mode power consumption of all components and to use accurate wake-up timers. However, the selection of components constitutes only a minor part of the solution, and an energy-efficient MAC layer design being able to

  15. Buffer-Aided Relaying with Adaptive Link Selection

    DEFF Research Database (Denmark)

    Zlatanov, Nikola; Schober, Robert; Popovski, Petar

    2013-01-01

    In this paper, we consider a simple network consisting of a source, a half-duplex decode-and-forward relay, and a destination. We propose a new relaying protocol employing adaptive link selection, i.e., in any given time slot, based on the channel state information of the source-relay and the relay......-constrained and delay-unconstrained transmission. For the delay-unconstrained case, we characterize the optimal link selection policy, derive the corresponding throughput, and develop an optimal power allocation scheme. For the delay-constrained case, we propose to starve the buffer of the relay by choosing...

  16. Matching of Energy Provisions in Multihop Wireless Infra-Structures

    Directory of Open Access Journals (Sweden)

    Rui Teng

    2016-01-01

    Full Text Available Recently there have been large advances in energy technologies for battery-operated systems, including green energy resources and high capacity batteries. The effective use of battery energy resources in wireless infrastructure networks to improve the versatility and reliability of wireless communications is an important issue. Emerging applications of smart cities, Internet of Things (IoT, and emergency responses highly rely on the basic communication network infrastructures that enable ubiquitous network connections. However, energy consumption by nodes in a wireless infrastructure network depends on the transmissions of other nodes in the network. Considering this inter-dependence is necessary to achieve efficient provision of energy in wireless networks. This paper studies the issue of energy provision for wireless relay nodes in Wireless Multihop Infrastructures (WMI assuming constraints on the total energy provision. We introduce a scheme of Energy Provision Matching (Matching-EP for WMI which optimizes energy provision based on matching of energy provision with estimates of differentiated position-dependent energy consumption by wireless nodes distributed in the network. The evaluation results show that Matching-EP with 4%–34% improvement in energy matching degree enables 10%–40% improvement of the network lifetime, and 5%–40% improvement of packet delivery compared with conventional WMI networks.

  17. Comparison of Channel Estimation Protocols for Coherent AF Relaying Networks in the Presence of Additive Noise and LO Phase Noise

    Directory of Open Access Journals (Sweden)

    Stefan Berger

    2010-01-01

    Full Text Available Channel estimation protocols for wireless two-hop networks with amplify-and-forward (AF relays are compared. We consider multiuser relaying networks, where the gain factors are chosen such that the signals from all relays add up coherently at the destinations. While the destinations require channel knowledge in order to decode, our focus lies on the channel estimates that are used to calculate the relay gains. Since knowledge of the compound two-hop channels is generally not sufficient to do this, the protocols considered here measure all single-hop coefficients in the network. We start from the observation that the direction in which the channels are measured determines (1 the number of channel uses required to estimate all coefficient and (2 the need for global carrier phase reference. Four protocols are identified that differ in the direction in which the first-hop and the second-hop channels are measured. We derive a sensible measure for the accuracy of the channel estimates in the presence of additive noise and phase noise and compare the protocols based on this measure. Finally, we provide a quantitative performance comparison for a simple single-user application example. It is important to note that the results can be used to compare the channel estimation protocols for any two-hop network configuration and gain allocation scheme.

  18. Relay Architectures for 3GPP LTE-Advanced

    Directory of Open Access Journals (Sweden)

    Peters StevenW

    2009-01-01

    Full Text Available The Third Generation Partnership Project's Long Term Evolution-Advanced is considering relaying for cost-effective throughput enhancement and coverage extension. While analog repeaters have been used to enhance coverage in commercial cellular networks, the use of more sophisticated fixed relays is relatively new. The main challenge faced by relay deployments in cellular systems is overcoming the extra interference added by the presence of relays. Most prior work on relaying does not consider interference, however. This paper analyzes the performance of several emerging half-duplex relay strategies in interference-limited cellular systems: one-way, two-way, and shared relays. The performance of each strategy as a function of location, sectoring, and frequency reuse are compared with localized base station coordination. One-way relaying is shown to provide modest gains over single-hop cellular networks in some regimes. Shared relaying is shown to approach the gains of local base station coordination at reduced complexity, while two-way relaying further reduces complexity but only works well when the relay is close to the handset. Frequency reuse of one, where each sector uses the same spectrum, is shown to have the highest network throughput. Simulations with realistic channel models provide performance comparisons that reveal the importance of interference mitigation in multihop cellular networks.

  19. Implementation Of Solid State Relays For Power System Protection

    Directory of Open Access Journals (Sweden)

    Nidhi Verma

    2015-06-01

    Full Text Available ABSTRACT This paper provides the implementation of solid state relays for enhancement of power system protection. Relays are an essential part of the power systems and are responsible for the control of any overload voltage or current and protection of the devices from these parameters. The main function of the relay is to constantly monitor the parameter to be controlled and if it exceeds the percentage range set by the controller then it sends a signal to the circuit breaker to break the connection and isolate the faulty part. Solid state relays are preferred over mechanical relays and in this paper relay functioning is done with the help of opto-coupler. Controlling of opto- coupler is done with the help of microcontroller. Circuit operates through Zero Voltage Switching leading to reduction in harmonics. The implementation of relay circuit offers minimal delay time which enables better time response for protection.

  20. Joint Uplink and Downlink Relay Selection in Cooperative Cellular Networks

    CERN Document Server

    Yang, Wei; Wu, Gang; Wang, Haifeng; Wang, Ying

    2010-01-01

    We consider relay selection technique in a cooperative cellular network where user terminals act as mobile relays to help the communications between base station (BS) and mobile station (MS). A novel relay selection scheme, called Joint Uplink and Downlink Relay Selection (JUDRS), is proposed in this paper. Specifically, we generalize JUDRS in two key aspects: (i) relay is selected jointly for uplink and downlink, so that the relay selection overhead can be reduced, and (ii) we consider to minimize the weighted total energy consumption of MS, relay and BS by taking into account channel quality and traffic load condition of uplink and downlink. Information theoretic analysis of the diversity-multiplexing tradeoff demonstrates that the proposed scheme achieves full spatial diversity in the quantity of cooperating terminals in this network. And numerical results are provided to further confirm a significant energy efficiency gain of the proposed algorithm comparing to the previous best worse channel selection an...

  1. Opportunistic Fixed Gain Bidirectional Relaying with Outdated CSI

    KAUST Repository

    Khan, Fahd Ahmed

    2015-05-01

    In a network with multiple relays, relay selection has been shown as an effective scheme to achieve diversity as well as to improve the overall throughput. This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplify-and-forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to corroborate the derived analytical results. It is shown that adding relays does not improve the performance if the channel is substantially outdated. Furthermore, relay location is also taken into consideration and it is shown that the performance can be improved by placing the relay closer to the source whose channel is more outdated. © 2015 IEEE.

  2. A Decentralized Wireless Solution to Monitor and Diagnose PV Solar Module Performance Based on Symmetrized-Shifted Gompertz Functions.

    Science.gov (United States)

    Molina-García, Angel; Campelo, José Carlos; Blanc, Sara; Serrano, Juan José; García-Sánchez, Tania; Bueso, María C

    2015-07-29

    This paper proposes and assesses an integrated solution to monitor and diagnose photovoltaic (PV) solar modules based on a decentralized wireless sensor acquisition system. Both DC electrical variables and environmental data are collected at PV module level using low-cost and high-energy efficiency node sensors. Data is real-time processed locally and compared with expected PV module performances obtained by a PV module model based on symmetrized-shifted Gompertz functions (as previously developed and assessed by the authors). Sensor nodes send data to a centralized sink-computing module using a multi-hop wireless sensor network architecture. Such integration thus provides extensive analysis of PV installations, and avoids off-line tests or post-processing processes. In comparison with previous approaches, this solution is enhanced with a low-cost system and non-critical performance constraints, and it is suitable for extensive deployment in PV power plants. Moreover, it is easily implemented in existing PV installations, since no additional wiring is required. The system has been implemented and assessed in a Spanish PV power plant connected to the grid. Results and estimations of PV module performances are also included in the paper.

  3. On mobile wireless ad hoc IP video transports

    Science.gov (United States)

    Kazantzidis, Matheos

    2006-05-01

    Multimedia transports in wireless, ad-hoc, multi-hop or mobile networks must be capable of obtaining information about the network and adaptively tune sending and encoding parameters to the network response. Obtaining meaningful metrics to guide a stable congestion control mechanism in the transport (i.e. passive, simple, end-to-end and network technology independent) is a complex problem. Equally difficult is obtaining a reliable QoS metrics that agrees with user perception in a client/server or distributed environment. Existing metrics, objective or subjective, are commonly used after or before to test or report on a transmission and require access to both original and transmitted frames. In this paper, we propose that an efficient and successful video delivery and the optimization of overall network QoS requires innovation in a) a direct measurement of available and bottleneck capacity for its congestion control and b) a meaningful subjective QoS metric that is dynamically reported to video sender. Once these are in place, a binomial -stable, fair and TCP friendly- algorithm can be used to determine the sending rate and other packet video parameters. An adaptive mpeg codec can then continually test and fit its parameters and temporal-spatial data-error control balance using the perceived QoS dynamic feedback. We suggest a new measurement based on a packet dispersion technique that is independent of underlying network mechanisms. We then present a binomial control based on direct measurements. We implement a QoS metric that is known to agree with user perception (MPQM) in a client/server, distributed environment by using predetermined table lookups and characterization of video content.

  4. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Science.gov (United States)

    Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions. PMID:25615734

  5. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Directory of Open Access Journals (Sweden)

    Ramviyas Parasuraman

    2014-12-01

    Full Text Available The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS. When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities, there is a possibility that some electronic components may fail randomly (due to radiation effects, which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions.

  6. A multi-sensor RSS spatial sensing-based robust stochastic optimization algorithm for enhanced wireless tethering.

    Science.gov (United States)

    Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-12-12

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the "server-relay-client" framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions.

  7. Finite-SNR analysis for partial relaying cooperation with channel coding and opportunistic relay selection

    Science.gov (United States)

    Vu, Thang X.; Duhamel, Pierre; Chatzinotas, Symeon; Ottersten, Bjorn

    2017-12-01

    This work studies the performance of a cooperative network which consists of two channel-coded sources, multiple relays, and one destination. To achieve high spectral efficiency, we assume that a single time slot is dedicated to relaying. Conventional network-coded-based cooperation (NCC) selects the best relay which uses network coding to serve the two sources simultaneously. The bit error rate (BER) performance of NCC with channel coding, however, is still unknown. In this paper, we firstly study the BER of NCC via a closed-form expression and analytically show that NCC only achieves diversity of order two regardless of the number of available relays and the channel code. Secondly, we propose a novel partial relaying-based cooperation (PARC) scheme to improve the system diversity in the finite signal-to-noise ratio (SNR) regime. In particular, closed-form expressions for the system BER and diversity order of PARC are derived as a function of the operating SNR value and the minimum distance of the channel code. We analytically show that the proposed PARC achieves full (instantaneous) diversity order in the finite SNR regime, given that an appropriate channel code is used. Finally, numerical results verify our analysis and demonstrate a large SNR gain of PARC over NCC in the SNR region of interest.

  8. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  9. TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal Saud Yousef

    2011-07-31

    We propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11 stack, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity in parking lot and large grid topologies.

  10. Study of Wireless Authentication Center with Mixed Encryption in WSN

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available WSN (wireless sensor network has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit and WiFi (Wireless Fidelity module and uses RSA, AES (Advanced Encryption Standard, and SHA-1 (Secure Hash Algorithm 1 to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

  11. Laser Communications Relay Demonstration (LCRD) Update and the Path Towards Optical Relay Operations

    Science.gov (United States)

    Israel, David J.; Edwards, Bernard L.; Staren, John W.

    2017-01-01

    This paper provides a concept for an evolution of NASA's optical communications near Earth relay architecture. NASA's Laser Communications Relay Demonstration (LCRD), a joint project between NASA's Goddard Space Flight Center (GSFC), the Jet Propulsion Laboratory - California Institute of Technology (JPL), and the Massachusetts Institute of Technology Lincoln Laboratory (MIT LL). LCRD will provide a minimum of two years of high data rate optical communications service experiments in geosynchronous orbit (GEO), following launch in 2019. This paper will provide an update of the LCRD mission status and planned capabilities and experiments, followed by a discussion of the path from LCRD to operational network capabilities.

  12. Modeling Electromechanical Overcurrent Relays Using Singular Value Decomposition

    Directory of Open Access Journals (Sweden)

    Feng-Jih Wu

    2012-01-01

    Full Text Available This paper presents a practical and effective novel approach to curve fit electromechanical (EM overcurrent (OC relay characteristics. Based on singular value decomposition (SVD, the curves are fitted with equation in state space under modal coordinates. The relationships between transfer function and Markov parameters are adopted in this research to represent the characteristic curves of EM OC relays. This study applies the proposed method to two EM OC relays: the GE IAC51 relay with moderately inverse-time characteristic and the ABB CO-8 relay with inverse-time characteristic. The maximum absolute values of errors of hundreds of sample points taken from four time dial settings (TDS for each relay between the actual characteristic curves and the corresponding values from the curve-fitting equations are within the range of 10 milliseconds. Finally, this study compares the SVD with the adaptive network and fuzzy inference system (ANFIS to demonstrate its accuracy and identification robustness.

  13. Effectiveness of frequency relays on networks with multiple distributed generation

    Directory of Open Access Journals (Sweden)

    A.A.M. Hassan

    2015-05-01

    Full Text Available Distributed generation (DG has gained a vital role in distribution utilities. So, it is important to correctly detect islanding of DG units. Frequency relays are one of the most commonly used loss of mains detection method. However, distribution utilities may be faced by concern related to false operation of these frequency relays. The commercially available frequency relays reported considering standard tight setting. This paper investigates some factors related to relays internal algorithm that contribute to their different operating responses. The factors that will be investigated are frequency measuring techniques, measuring windows, time delays and under voltage interlock function. With the increasing penetration of DG into the network, it is becoming common to have multiple DG units connected at the same network location. Two generators connected at the same location and employing frequency relays with the same setting but different characteristics were simulated. When subjected to the same network disturbances the possible interference between the two relays is analyzed.

  14. Relay Telecommunications for the Coming Decade of Mars Exploration

    Science.gov (United States)

    Edwards, C.; DePaula, R.

    2010-01-01

    Over the past decade, an evolving network of relay-equipped orbiters has advanced our capabilities for Mars exploration. NASA's Mars Global Surveyor, 2001 Mars Odyssey, and Mars Reconnaissance Orbiter (MRO), as well as ESA's Mars Express Orbiter, have provided telecommunications relay services to the 2003 Mars Exploration Rovers, Spirit and Opportunity, and to the 2007 Phoenix Lander. Based on these successes, a roadmap for continued Mars relay services is in place for the coming decade. MRO and Odyssey will provide key relay support to the 2011 Mars Science Laboratory (MSL) mission, including capture of critical event telemetry during entry, descent, and landing, as well as support for command and telemetry during surface operations, utilizing new capabilities of the Electra relay payload on MRO and the Electra-Lite payload on MSL to allow significant increase in data return relative to earlier missions. Over the remainder of the decade a number of additional orbiter and lander missions are planned, representing new orbital relay service providers and new landed relay users. In this paper we will outline this Mars relay roadmap, quantifying relay performance over time, illustrating planned support scenarios, and identifying key challenges and technology infusion opportunities.

  15. Power supply devices and systems of relay protection

    CERN Document Server

    Gurevich, Vladimir

    2013-01-01

    Power Supply Devices and Systems of Relay Protection brings relay protection and electrical power engineers a single, concentrated source of information on auxiliary power supply systems and devices. The book also tackles specific problems and solutions of relay protection power supply systems and devices, which are often not dealt with in the literature. The author, an experienced engineer with more than 100 patents, draws on his own experience to offer practical, tested advice to readers. A Guide to Relay Protection Power Supply for Engineers and Technicians The first chapter reviews the ele

  16. Cooperative relay-based multicasting for energy and delay minimization

    KAUST Repository

    Atat, Rachad

    2012-08-01

    Relay-based multicasting for the purpose of cooperative content distribution is studied. Optimized relay selection is performed with the objective of minimizing the energy consumption or the content distribution delay within a cluster of cooperating mobiles. Two schemes are investigated. The first consists of the BS sending the data only to the relay, and the second scheme considers the scenario of threshold-based multicasting by the BS, where a relay is selected to transmit the data to the mobiles that were not able to receive the multicast data. Both schemes show significant superiority compared to the non-cooperative scenarios, in terms of energy consumption and delay reduction. © 2012 IEEE.

  17. Full-Duplex Relay Selection in Cognitive Underlay Networks

    KAUST Repository

    Khafagy, Mohammad Galal

    2017-09-30

    In this work, we analyze the performance of full-duplex relay selection (FDRS) in spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay(s), thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint, which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic FDRS with residual self-interference (RSI) by deriving the exact cumulative distribution function of its end-to-end signal-to-interference-plus-noise ratio under Nakagami-m fading. We also evaluate the offered diversity gain of relay selection for different full-duplex cooperation schemes in the presence/absence of a direct source-destination link. When the adopted RSI link gain model is sublinear in the relay power, which agrees with recent research findings, we show that remarkable diversity gain can be recovered even in the presence of an interfering direct link. Second, we evaluate the end-to-end performance of FDRS with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  18. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond.

    Science.gov (United States)

    Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment.

  19. Performance analysis of two-way amplify and forward relaying with adaptive modulation over multiple relay network

    KAUST Repository

    Hwang, Kyusung

    2011-02-01

    In this letter, we propose two-way amplify-and-forward relaying in conjunction with adaptive modulation in order to improve spectral efficiency of relayed communication systems while monitoring the required error performance. We also consider a multiple relay network where only the best relay node is utilized so that the diversity order increases while maintaining a low complexity of implementation as the number of relays increases. Based on the best relay selection criterion, we offer an upper bound on the signal-to-noise ratio to keep the performance analysis tractable. Our numerical examples show that the proposed system offers a considerable gain in spectral efficiency while satisfying the error rate requirements. © 2011 IEEE.

  20. A Broadcast Channel Assignment Mechanism based on The Broadcast Tree for Multi-radio Multi-channel Wireless Mesh Networks

    Science.gov (United States)

    Xia, Yan; Zeng, Yingzhi

    2016-02-01

    This paper proposed a broadcast Channel Assignment Mechanism on base of optimized Broadcast Tree for wireless Mesh network (WMN), which is created by Branch and Bound Method. The simulations show that our algorithm not only reduces the broadcast redundancy but also avoids the potential channel interferences produced by unnecessary relay nodes.

  1. Laser Communications Relay Demonstration: Introduction for Experimenters

    Science.gov (United States)

    Israel, David J.

    2017-01-01

    This document provides guidance to individuals or groups considering proposing an experiment for the Laser Communications Relay Demonstration (LCRD) Experiment Program. For the purposes of this document, the term experiment refers to both experiments and demonstrations. The documents goals are: (1) to introduce potential experimenters to the LCRD mission, its purpose, and its system architecture; (2) to help them understand the types of experiments that are possible using LCRD; and (3) to provide an overview of the experiment proposal process and explain how and where to obtain further information about making a proposal.

  2. Uplink Capacity of 802.16j Mobile Multihop Relay Networks with Transparent Relays

    DEFF Research Database (Denmark)

    Wang, Hua; Andrews, Jeffrey G.; Iversen, Villy Bæk

    2009-01-01

    -to-end spectral efficiency. Furthermore, the position and the number of relay stations (RSs) have a great impact on the capacity gain. These results are further verified in the evaluation of the system Erlang capacity. The study demonstrates that with proper deployment of RSs and use of MIMO transmission...

  3. Joint Source and Relay Precoding Designs for MIMO Two-Way Relaying Based on MSE Criterion

    CERN Document Server

    Wang, Rui

    2011-01-01

    Properly designed precoders can significantly improve the spectral efficiency of multiple-input multiple-output (MIMO) relay systems. In this paper, we investigate joint source and relay precoding design based on the mean-square-error (MSE) criterion in MIMO two-way relay systems, where two multi-antenna source nodes exchange information via a multi-antenna amplify-and-forward relay node. This problem is non-convex and its optimal solution remains unsolved. Aiming to find an efficient way to solve the problem, we first decouple the primal problem into three tractable sub-problems, and then propose an iterative precoding design algorithm based on alternating optimization. The solution to each sub-problem is optimal and unique, thus the convergence of the iterative algorithm is guaranteed. Secondly, we propose a structured precoding design to lower the computational complexity. The proposed precoding structure is able to parallelize the channels in the multiple access (MAC) phase and broadcast (BC) phase. It th...

  4. Dual-Hop Transmission Scheme Based on Hierarchical Modulation in Wireless Networks

    Science.gov (United States)

    Shin, Jeong-Chul; Song, Jin-Hyuk; Kim, Jee-Hoon; Song, Hyoung-Kyu

    Dual-hop wireless transmission is a technique by which the channel from the source to the destination is divided into two shorter links using relays. By using this transmission, the communications reliability is improved whereas the throughput might go down since the dual-hop transmission is performed by two times. In this letter, we propose a scheme that uses hierarchical modulation at the source and adaptive modulation based on cyclic redundancy check (CRC) code at the relays. The proposed scheme is evaluated in terms of the bit error rate (BER) and throughput performances.

  5. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  6. Sparse Channel Estimation for MIMO-OFDM Two-Way Relay Network with Compressed Sensing

    Directory of Open Access Journals (Sweden)

    Aihua Zhang

    2013-01-01

    Full Text Available Accurate channel impulse response (CIR is required for equalization and can help improve communication service quality in next-generation wireless communication systems. An example of an advanced system is amplify-and-forward multiple-input multiple-output two-way relay network, which is modulated by orthogonal frequency-division multiplexing. Linear channel estimation methods, for example, least squares and expectation conditional maximization, have been proposed previously for the system. However, these methods do not take advantage of channel sparsity, and they decrease estimation performance. We propose a sparse channel estimation scheme, which is different from linear methods, at end users under the relay channel to enable us to exploit sparsity. First, we formulate the sparse channel estimation problem as a compressed sensing problem by using sparse decomposition theory. Second, the CIR is reconstructed by CoSaMP and OMP algorithms. Finally, computer simulations are conducted to confirm the superiority of the proposed methods over traditional linear channel estimation methods.

  7. Record Participation in the Relay Race!

    CERN Multimedia

    2002-01-01

    CERN has a more sporting spirit than ever before. This is not the result of any survey, but the impression you got as soon as you saw the 62 teams of six runners each speeding around the laboratory in the 32nd annual relay race. This year 11 more teams competed than in 2001.   First changeover: Hervé Cornet takes over from Camille Ruiz Llamas for The Shabbys, and Sebastian Dorthe from Daniel Matteazzi for Charmilles Technologies. Jérôme Bendotti (EP/TA1) just holding off the team from the WHO at the finish. A total of 372 people ran together last Wednesday in this year's relay race, making for a record participation. It also seems that women are becoming more and more attracted by this competition, since this year there were eight ladies teams, also a new record. The first team were The Shabbys in a time of 10 minutes 45 seconds, finishing almost before the second team had started its last 300 metre leg. The 6 runners in each team cover distances of 1000, 800, 800,...

  8. CERN Relay Race: sporty and colourful

    CERN Multimedia

    Andy Butterworth, CERN Running Club

    2013-01-01

    On Thursday 23 May, the 43rd CERN Relay Race took place, with 108 teams on the starting line, the largest participation ever!       The DG was present at the start and said a few words to encourage the runners. At 12:15, the Solar Club and handbike racers, led by Jean-Yves Le Meur, were the first to set off. And as last year, the relay runners were accompanied by an enthusiastic group of Nordic walkers. The first team across the finish line was "Velo City", in a very fast time of 10'31". New this year was a prize category for the best fancy dress, which was won by Les Schtroumpfs from the BE Department. The challenge for the best represented department was won for the third year in a row by FP, but second and third were HR and IT, up from 6th and 9th places last year. To see all the pictures of the event, click here.

  9. The Laser Communications Relay Demonstration Experiment Program

    Science.gov (United States)

    Israel, David J.; Edwards, Bernard L.; Moores, John D.; Piazzolla, Sabino; Merritt, Scott

    2017-01-01

    This paper elaborates on the Laser Communications Relay Demonstration (LCRD) Experiment Program, which will engage in a number of pre-determined experiments and also call upon a wide variety of experimenters to test new laser communications technology and techniques, and to gather valuable data. LCRD is a joint project between NASA's Goddard Space Flight Center (GSFC), the Jet Propulsion Laboratory (JPL), and the Massachusetts Institute of Technology Lincoln Laboratory (MIT LL). LCRD will test the functionality in various settings and scenarios of optical communications links from a GEO (Geosynchronous Earth Orbit) payload to ground stations in Southern California and Hawaii over a two-year period following launch in 2019. The LCRD investigator team will execute numerous experiments to test critical aspects of laser communications activities over real links and systems, collecting data on the effects of atmospheric turbulence and weather on performance and communications availability. LCRD will also incorporate emulations of target scenarios, including direct-to-Earth (DTE) links from user spacecraft and optical relay providers supporting user spacecraft. To supplement and expand upon the results of these experiments, the project also includes a Guest Experimenters Program, which encourages individuals and groups from government agencies, academia and industry to propose diverse experiment ideas.

  10. Satellite-Relayed Intercontinental Quantum Network

    Science.gov (United States)

    Liao, Sheng-Kai; Cai, Wen-Qi; Handsteiner, Johannes; Liu, Bo; Yin, Juan; Zhang, Liang; Rauch, Dominik; Fink, Matthias; Ren, Ji-Gang; Liu, Wei-Yue; Li, Yang; Shen, Qi; Cao, Yuan; Li, Feng-Zhi; Wang, Jian-Feng; Huang, Yong-Mei; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Li, Li; Liu, Nai-Le; Koidl, Franz; Wang, Peiyuan; Chen, Yu-Ao; Wang, Xiang-Bin; Steindorfer, Michael; Kirchner, Georg; Lu, Chao-Yang; Shu, Rong; Ursin, Rupert; Scheidl, Thomas; Peng, Cheng-Zhi; Wang, Jian-Yu; Zeilinger, Anton; Pan, Jian-Wei

    2018-01-01

    We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ˜kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences and the Chinese Academy of Sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.

  11. Adapting Wireless Technology to Lighting Control and Environmental Sensing

    Energy Technology Data Exchange (ETDEWEB)

    Dana Teasdale; Francis Rubinstein; Dave Watson; Steve Purdy

    2005-10-01

    The high cost of retrofitting buildings with advanced lighting control systems is a barrier to adoption of this energy-saving technology. Wireless technology, however, offers a solution to mounting installation costs since it requires no additional wiring to implement. To demonstrate the feasibility of such a system, a prototype wirelessly-controlled advanced lighting system was designed and built. The system includes the following components: a wirelessly-controllable analog circuit module (ACM), a wirelessly-controllable electronic dimmable ballast, a T8 3-lamp fixture, an environmental multi-sensor, a current transducer, and control software. The ACM, dimmable ballast, multi-sensor, and current transducer were all integrated with SmartMesh{trademark} wireless mesh networking nodes, called motes, enabling wireless communication, sensor monitoring, and actuator control. Each mote-enabled device has a reliable communication path to the SmartMesh Manager, a single board computer that controls network functions and connects the wireless network to a PC running lighting control software. The ACM is capable of locally driving one or more standard 0-10 Volt electronic dimmable ballasts through relay control and a 0-10 Volt controllable output. The mote-integrated electronic dimmable ballast is designed to drive a standard 3-lamp T8 light fixture. The environmental multi-sensor measures occupancy, light level and temperature. The current transducer is used to measure the power consumed by the fixture. Control software was developed to implement advanced lighting algorithms, including daylight ramping, occupancy control, and demand response. Engineering prototypes of each component were fabricated and tested in a bench-scale system. Based on standard industry practices, a cost analysis was conducted. It is estimated that the installation cost of a wireless advanced lighting control system for a retrofit application is at least 30% lower than a comparable wired system for

  12. Opportunistic Cognitive Relaying: A Win-Win Spectrum Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Luo Haiyan

    2010-01-01

    Full Text Available A cost-effective spectrum sharing architecture is proposed to enable the legacy noncognitive secondary system to coexist with the primary system. Specifically, we suggest to install a few intermediate nodes, namely, the cognitive relays, to conduct the spectrum sensing and coordinate the spectrum access. To achieve the goal of win-win between primary and secondary systems, the cognitive relay may act as a cooperator for both of them, and an Opportunistic Cognitive Relaying (OCR scheme is specially devised. In this scheme, the cognitive relay opportunistically switches among three different working modes, that is, Relay for Primary Link (RPL, Relay for Secondary Link (RSL, or Relay for Neither of the Links (RNL, respectively, based on the channel-dependent observation of both systems. In addition, the transmit power for cognitive relay and secondary transmitter in each mode are optimally determined by maximizing the transmission rate of secondary system while keeping or even reducing the outage probability of primary system. Simulation results validate the efficiency of the proposed spectrum sharing scheme.

  13. Efficient Resource Scheduling by Exploiting Relay Cache for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Chun He

    2015-01-01

    Full Text Available In relay-enhanced cellular systems, throughput of User Equipment (UE is constrained by the bottleneck of the two-hop link, backhaul link (or the first hop link, and access link (the second hop link. To maximize the throughput, resource allocation should be coordinated between these two hops. A common resource scheduling algorithm, Adaptive Distributed Proportional Fair, only ensures that the throughput of the first hop is greater than or equal to that of the second hop. But it cannot guarantee a good balance of the throughput and fairness between the two hops. In this paper, we propose a Two-Hop Balanced Distributed Scheduling (TBS algorithm by exploiting relay cache for non-real-time data traffic. The evolved Node Basestation (eNB adaptively adjusts the number of Resource Blocks (RBs allocated to the backhaul link and direct links based on the cache information of relays. Each relay allocates RBs for relay UEs based on the size of the relay UE’s Transport Block. We also design a relay UE’s ACK feedback mechanism to update the data at relay cache. Simulation results show that the proposed TBS can effectively improve resource utilization and achieve a good trade-off between system throughput and fairness by balancing the throughput of backhaul and access link.

  14. 77 FR 20553 - Relay Services for Deaf-Blind Individuals

    Science.gov (United States)

    2012-04-05

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... individuals in a timely manner. DATES: This document is effective May 7, 2012, except the modified reporting... Relay Services for Deaf-Blind Individuals, Report and Order, document FCC 11-56, published at 76 FR...

  15. 77 FR 42187 - Relay Services for Deaf-Blind Individuals

    Science.gov (United States)

    2012-07-18

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Communications and Video Accessibility Act of 2010, Section 105, Relay Services for Deaf-Blind Individuals, Order... Services for Deaf-Blind Individuals, CG Docket No. 10-210. Form Number: N/A. Type of Review: Revision of a...

  16. Relay Coordination in the Protection of Radially-Connected Power ...

    African Journals Online (AJOL)

    Protective relays detect intolerable or unwanted conditions within an assigned area, and then trip or open one or more circuit breakers to isolate the problem area before it can damage or otherwise interfere with the eective operation of the rest of the power system. It often happens that a substation feeder relay and ...

  17. relay coordination in the protection of radially-connected power

    African Journals Online (AJOL)

    Abstract. Protective relays detect intolerable or unwanted conditions within an assigned area, and then trip or open one or more circuit breakers to isolate the problem area before it can damage or otherwise interfere with the effective operation of the rest of the power system. It often happens that a substation feeder relay ...

  18. protective relay studies for the nigerian national electric 330 kv ...

    African Journals Online (AJOL)

    user

    1985-09-01

    Sep 1, 1985 ... ABSTRACT. An indepth study and analysis has been performed on the 330KV transmission protective relay schemes of the National Electric Power Authority. Some of the basic considerations taken into account in the study to optimize the settings on the existing protective relay schemes are presented.

  19. Implementation of a Relay Coordination System for the Mars Network

    Science.gov (United States)

    Allard, Daniel A.

    2010-01-01

    Mars network relay operations involve the coordination of lander and orbiter teams through long-term and short-term planning, tactical changes and post-pass analysis. Much of this coordination is managed through email traffic and point-to-point file data exchanges. It is often difficult to construct a complete and accurate picture of the relay situation at any given moment, as there is no centralized store of correlated relay data. The Mars Relay Operations Service (MaROS) is being implemented to address the problem of relay coordination for current and next-generation relay missions. The service is provided for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These "relay" sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This paper will discuss the relay coordination problem space, overview the architecture and design selected to meet system requirements, and describe the first phase of system implementation

  20. Duplex Schemes in Multiple Antenna Two-Hop Relaying

    Directory of Open Access Journals (Sweden)

    Anja Klein

    2008-04-01

    Full Text Available A novel scheme for two-hop relaying defined as space division duplex (SDD relaying is proposed. In SDD relaying, multiple antenna beamforming techniques are applied at the intermediate relay station (RS in order to separate downlink and uplink signals of a bi-directional two-hop communication between two nodes, namely, S1 and S2. For conventional amplify-and-forward two-hop relaying, there appears a loss in spectral efficiency due to the fact that the RS cannot receive and transmit simultaneously on the same channel resource. In SDD relaying, this loss in spectral efficiency is circumvented by giving up the strict separation of downlink and uplink signals by either time division duplex or frequency division duplex. Two novel concepts for the derivation of the linear beamforming filters at the RS are proposed; they can be designed either by a three-step or a one-step concept. In SDD relaying, receive signals at S1 are interfered by transmit signals of S1, and receive signals at S2 are interfered by transmit signals of S2. An efficient method in order to combat this kind of interference is proposed in this paper. Furthermore, it is shown how the overall spectral efficiency of SDD relaying can be improved if the channels from S1 and S2 to the RS have different qualities.

  1. Analysis of Relay Selection Game in a Cooperative Communication Scenario

    DEFF Research Database (Denmark)

    Craciunescu, Razvan; Mihovska, Albena; Halunga, Simona

    This paper analysis the performances of a proposed set of functions that model the relay selection process in a cooperative communication scenario. The behavior and influence proposed functions create a mechanism for selecting the best relays to be used to send certain types of data. The mechanism...

  2. 76 FR 59551 - Internet-Based Telecommunications Relay Service Numbering

    Science.gov (United States)

    2011-09-27

    ...] Internet-Based Telecommunications Relay Service Numbering AGENCY: Federal Communications Commission. ACTION... to improve assignment of telephone numbers associated with Internet-based Telecommunications Relay...-2898, or via the Internet at http://www.bcpiweb.com . It is also available on the Commission's Web site...

  3. MaROS Strategic Relay Planning and Coordination Interfaces

    Science.gov (United States)

    Allard, Daniel A.

    2010-01-01

    The Mars Relay Operations Service (MaROS) is designed to provide planning and analysis tools in support of ongoing Mars Network relay operations. Strategic relay planning requires coordination between lander and orbiter mission ground data system (GDS) teams to schedule and execute relay communications passes. MaROS centralizes this process, correlating all data relevant to relay coordination to provide a cohesive picture of the relay state. Service users interact with the system through thin-layer command line and web user interface client applications. Users provide and utilize data such as lander view periods of orbiters, Deep Space Network (DSN) antenna tracks, and reports of relay pass performance. Users upload and download relevant relay data via formally defined and documented file structures including some described in Extensible Markup Language (XML). Clients interface with the system via an http-based Representational State Transfer (ReST) pattern using Javascript Object Notation (JSON) formats. This paper will provide a general overview of the service architecture and detail the software interfaces and considerations for interface design.

  4. Demonstration Model of Self Inductance Using Relay Using an ...

    Indian Academy of Sciences (India)

    IAS Admin

    Using an electrical component like a relay, the phenomenon of self inductance can easily be demonstrated to undergraduate students. By wiring simple electrical components like relay, neon bulb and a DC power supply, intermittent back electromotive force (emf) can be generated in the range from. 60 to 100 volt.

  5. 47 CFR 11.20 - State Relay Network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS messages...

  6. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...

  7. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  8. Buffer management in wireless full-duplex systems

    KAUST Repository

    Bouacida, Nader

    2015-10-19

    Wireless full-duplex radios can simultaneously transmit and receive using the same frequency. In theory, this can double the throughput. In fact, there is only little work addressing aspects other than throughput gains in full-duplex systems. Over-buffering in today\\'s networks or the so-called “bufferbloat” phenomenon creates excessive end-to-end delays resulting in network performance degradation. Our analysis shows that full-duplex systems may suffer from high latency caused by bloated buffers. In this paper, we address the problem of buffer management in full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. We compare the performance of WQM in full-duplex environment to Drop Tail mechanism over various scenarios. Our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases.

  9. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  10. Multiple relay selection for delay-limited applications

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-12-01

    A multiple relay selection system model that implements the decode-and-forward mode is investigated. All communication nodes are assumed to be equipped by multiple antennas. Furthermore, lattices space-time coded multiple-input multiple-output half duplex channel is applied. The main goal is to increase the throughput of the system by selecting multiple number of relays. The selection criteria depends on the maximum decoding delay at relays where the system implements a decoding time-out algorithm at each relay. This leads to a significant saving in the overall system power consumptions and attempts to solve the relays synchronization problem. All results are presented using numerical simulations. © 2012 IEEE.

  11. Community Wireless Networks

    Science.gov (United States)

    Feld, Harold

    2005-01-01

    With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…

  12. A Fully Integrated Wireless Compressed Sensing Neural Signal Acquisition System for Chronic Recording and Brain Machine Interface.

    Science.gov (United States)

    Liu, Xilin; Zhang, Milin; Xiong, Tao; Richardson, Andrew G; Lucas, Timothy H; Chin, Peter S; Etienne-Cummings, Ralph; Tran, Trac D; Van der Spiegel, Jan

    2016-07-18

    Reliable, multi-channel neural recording is critical to the neuroscience research and clinical treatment. However, most hardware development of fully integrated, multi-channel wireless neural recorders to-date, is still in the proof-of-concept stage. To be ready for practical use, the trade-offs between performance, power consumption, device size, robustness, and compatibility need to be carefully taken into account. This paper presents an optimized wireless compressed sensing neural signal recording system. The system takes advantages of both custom integrated circuits and universal compatible wireless solutions. The proposed system includes an implantable wireless system-on-chip (SoC) and an external wireless relay. The SoC integrates 16-channel low-noise neural amplifiers, programmable filters and gain stages, a SAR ADC, a real-time compressed sensing module, and a near field wireless power and data transmission link. The external relay integrates a 32 bit low-power microcontroller with Bluetooth 4.0 wireless module, a programming interface, and an inductive charging unit. The SoC achieves high signal recording quality with minimized power consumption, while reducing the risk of infection from through-skin connectors. The external relay maximizes the compatibility and programmability. The proposed compressed sensing module is highly configurable, featuring a SNDR of 9.78 dB with a compression ratio of 8×. The SoC has been fabricated in a 180 nm standard CMOS technology, occupying 2.1 mm × 0.6 mm silicon area. A pre-implantable system has been assembled to demonstrate the proposed paradigm. The developed system has been successfully used for long-term wireless neural recording in freely behaving rhesus monkey.

  13. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    Directory of Open Access Journals (Sweden)

    Buha Danilo

    2016-01-01

    Full Text Available The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B" are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according to which the calculations are done are described. Criteria used to provide the protection to fulfill the backup protection role in the event of malfunction of the main protection of the transmission system. are clarified. The calculation of all protection functions (32 functions of generator B1 were performed in the project "Coordination of relay protection blocks B1 and B2 with the system of excitation and power system protections -TENT B".

  14. CERN Relay Race | 5 June | Get ready!

    CERN Multimedia

    CERN Medical Service

    2014-01-01

    In anticipation of the CERN relay race, the Medical Service would like to remind all participants that preparing for this sporting activity is essential - even though it is a short event.   Progressive and regular training. Adequate nutrition and hydration. Advice and information is available at the infirmary in Building 57. Everyone should adapt their physical activity to match their fitness levels, bearing in mind that the aim of this race is not necessarily to achieve great success but to participate in a collective sporting event. In the framework of the "Move! Eat better" campaign and for the third successive year, a 2.4 km route is open to walkers, both beginners and experts. Before, during and after this event, test yourself with a pedometer, available from the CERN infirmary! 

  15. Large Efficient Intelligent Heating Relay Station System

    Science.gov (United States)

    Wu, C. Z.; Wei, X. G.; Wu, M. Q.

    2017-12-01

    The design of large efficient intelligent heating relay station system aims at the improvement of the existing heating system in our country, such as low heating efficiency, waste of energy and serious pollution, and the control still depends on the artificial problem. In this design, we first improve the existing plate heat exchanger. Secondly, the ATM89C51 is used to control the whole system and realize the intelligent control. The detection part is using the PT100 temperature sensor, pressure sensor, turbine flowmeter, heating temperature, detection of user end liquid flow, hydraulic, and real-time feedback, feedback signal to the microcontroller through the heating for users to adjust, realize the whole system more efficient, intelligent and energy-saving.

  16. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  17. Satellite data-relay activities in Arizona

    Science.gov (United States)

    Boner, F.C.; Blee, J.W.; Shope, W.G.

    1985-01-01

    The U.S. Geological Survey (USGS) Arizona District collects data from automated streamflow stations for a wide variety of uses. Data from these stations are provided to Federal, State, and local agencies that have a responsibility to issue flood warnings; to generate forecasts of water availability; to monitor flow to insure compliance with treaties and other legal mandates; and to manage reservoirs for hydropower, flood abatement, and municipal and irrigation water supply. In the mid-1970's, the escalation of data collection costs and a need for more timely data led the Arizona District to examine alternatives for remote data acquisition. On the basis of successful data communications experiments with NASA 's Landsat satellite, an operational system for satellite-data relay was developed in 1976 using the National Oceanic and Atmospheric Administrations 's (NOAA) Geostationary Operational Environmental Satellite (GOES). A total of 62 data collection platforms (DCP's) was operated in 1983. Satellite telemetry operations are controlled at the remote data-collection stations by small battery-operated data collection platforms. The DCP 's periodically collect data from the sensors, store the data in computer memory, and at preset times transmit the data to the GOES satellite. The satellite retransmits the data to Earth where a ground-receive station transmits or transfers the data by land communications to the USGS computer in Reston, Virginia, for processing. The satellite relay transfers the data from sensor to computer in minutes; therefore, the data are available to users on a near real-time basis. (Author 's abstract)

  18. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  19. Breadth-first search-based single-phase algorithms for bridge detection in wireless sensor networks.

    Science.gov (United States)

    Akram, Vahid Khalilpour; Dagdeviren, Orhan

    2013-07-10

    Wireless sensor networks (WSNs) are promising technologies for exploring harsh environments, such as oceans, wild forests, volcanic regions and outer space. Since sensor nodes may have limited transmission range, application packets may be transmitted by multi-hop communication. Thus, connectivity is a very important issue. A bridge is a critical edge whose removal breaks the connectivity of the network. Hence, it is crucial to detect bridges and take preventions. Since sensor nodes are battery-powered, services running on nodes should consume low energy. In this paper, we propose energy-efficient and distributed bridge detection algorithms for WSNs. Our algorithms run single phase and they are integrated with the Breadth-First Search (BFS) algorithm, which is a popular routing algorithm. Our first algorithm is an extended version of Milic's algorithm, which is designed to reduce the message length. Our second algorithm is novel and uses ancestral knowledge to detect bridges. We explain the operation of the algorithms, analyze their proof of correctness, message, time, space and computational complexities. To evaluate practical importance, we provide testbed experiments and extensive simulations. We show that our proposed algorithms provide less resource consumption, and the energy savings of our algorithms are up by 5.5-times.

  20. Cross Layer Adaptation of Check Intervals in Low Power Listening MAC Protocols for Lifetime Improvement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Maria-Cristina Marinescu

    2012-08-01

    Full Text Available Preamble sampling-based MAC protocols designed forWireless Sensor Networks (WSN are aimed at prolonging the lifetime of the nodes by scheduling their times of activity. This scheduling exploits node synchronization to find the right trade-off between energy consumption and delay. In this paper we consider the problem of node synchronization in preamble sampling protocols. We propose Cross Layer Adaptation of Check intervals (CLAC, a novel protocol intended to reduce the energy consumption of the nodes without significantly increasing the delay. Our protocol modifies the scheduling of the nodes based on estimating the delay experienced by a packet that travels along a multi-hop path. CLAC uses routing and MAC layer information to compute a delay that matches the packet arrival time. We have implemented CLAC on top of well-known routing and MAC protocols for WSN, and we have evaluated our implementation using the Avrora simulator. The simulation results confirm that CLAC improves the network lifetime at no additional packet loss and without affecting the end-to-end delay.

  1. Numerically Optimized Uniformly Most Powerful Alphabets for Hierarchical-Decode-and-Forward Two-Way Relaying

    Directory of Open Access Journals (Sweden)

    M. Hekrdla

    2011-01-01

    Full Text Available We address the issue of the parametric performance of the Hierarchical-Decode-and-Forward (HDF strategy in a wireless 2-way relay channel. Promising HDF, representing the concept of wireless network coding, performs well with a pre-coding strategy that requires Channel State Information (CSI on the transceiver side. Assuming a practical case when CSI is available only on the receiver side and the channel conditions do not allow adaptive strategies, the parametrization causes significant HDF performance degradation for some modulation alphabets. Alphabets that are robust to the parametrization (denoted Uniformly Most Powerful (UMP have already been proposed restricting on the class of non-linear multi-dimensional frequency modulations. In this work, we focus on the general design of unrestricted UMP alphabets. We formulate an optimization problem which is solved by standard non-linear convex constrained optimization algorithms, particularly by Nelder-Mead global optimization search, which is further refined by the local interior-pointsmethod.

  2. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  3. Two-Hop Secure Communication Using an Untrusted Relay

    Directory of Open Access Journals (Sweden)

    Xiang He

    2009-01-01

    Full Text Available We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.

  4. Two-hop Secure Communication Using an Untrusted Relay

    CERN Document Server

    He, Xiang

    2009-01-01

    We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external "good samaritan" node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a ca...

  5. OFDMA Cellular Networks with Opportunistic Two-Hop Relays

    Directory of Open Access Journals (Sweden)

    Calcev George

    2009-01-01

    Full Text Available We investigate the benefits of two-hop opportunistic relay in time division duplex (TDD OFDMA cellular network configurations. The paper starts with a short analytical model for the two-hop opportunistic relay. The model expresses the probability of finding a suitable relay node in the presence of lognormal fading and it allows the computation of the expected number of out-of-coverage nodes, as well as the end-to-end spectrum efficiency increase due to opportunistic relaying. The paper then presents results for Monte Carlo simulations of opportunistic relay in some realistic scenarios. Specifically, the simulations consider two scenarios. The first scenario uses the propagation model and a wide-area 19-cell configuration specified in 802.16 OFDMA cellular standard evaluation methodologies. In the second scenario, a Manhattan-like 19-cell topology is used. Our simulations show 11% to 33% in throughput increase when the opportunistic relay technology is used. Our results evaluate the benefits of the opportunistic relay in both scenarios in terms of coverage extension and throughput increase.

  6. Power supply risk assessment method for relay protection system faults

    Directory of Open Access Journals (Sweden)

    Tuyou Si

    2016-12-01

    Full Text Available The influence and the potential risk due to hidden faults of a relay protection system on power supply in distribution systems are paid more and more attention to. A probability analysis method is used to analyse fault characteristics and action mechanism of dominant faults, hidden misoperation and non-operation of the relay protection systems, and failure probability model of relay protection system is constructed and simplified. The effects of dominant faults, hidden misoperation and non-operation of the relay protection systems on the reduced power supply load power are analysed, and a probabilistic model for reduced power supply load power is constructed by three parts corresponding to dominant faults, hidden misoperation and non-operation. A probability calculation method of power supply risk occurrence due to hidden faults of relay protecttion system is proposed considering the fault probability of the relay protection systems, the frequency of the hidden faults occurring in operation period, the reduced power supply load power or load power outage, and the connection mode of the in-lines, out-lines and transformers in a substation. The feasibility and applicability of the proposed method for estimation of risk value probability of the relay protection systems is verified by two studied examples.

  7. Real-Time Wireless Moisture Sensing in Concrete Using Interdigitated Stick-on Sensors

    Directory of Open Access Journals (Sweden)

    Rashed H. Bhuiyan

    2015-12-01

    Full Text Available The analyses, design, and performance of an interdigitated moisture sensor are presented. The analytical results clearly delineate the scope of the design in terms of the expected electric field penetration depth and interelectrode capacitance when the sensor is placed on top of a Material Under Test (MUT for a simple two electrode sensor. A multielectrode circular sensor was fabricated, instrumented, and used to measure concrete moisture content. Real-time moisture measurement results in both fresh concrete (when curing and dry concrete (when moisture intrusion is occurring are presented in a wireless system level measurement scenario where the measured results are relayed to a distant receiver using a wireless transmitter.

  8. Modeling of Multihop Wireless Sensor Networks with MAC, Queuing, and Cooperation

    OpenAIRE

    Jian Lin; Mary Ann Weitnauer

    2016-01-01

    We present a Markovian decision process (MDP) framework for multihop wireless sensor networks (MHWSNs) to bound the network performance of both energy constrained (EC) networks and energy harvesting (EH) networks, both with and without relay cooperation. The model provides the fundamental performance limit that a MHWSN can theoretically achieve, under the general constraints from medium access control, routing, and energy harvesting. We observe that the analyses for EC and EH networks fall in...

  9. Systematic Network Coding with the Aid of a Full-Duplex Relay

    DEFF Research Database (Denmark)

    Giacaglia, Giuliano; Shi, Xiaomeng; Kim, MinJi

    2013-01-01

    is to deliver a given number of data packets to a receiver with the aid of a relay. The source broadcasts to both the receiver and the relay using one frequency, while the relay uses another frequency for transmissions to the receiver, allowing for a full-duplex operation of the relay. We analyze the decoding...

  10. Robust Nash Dynamic Game Strategy for User Cooperation Energy Efficiency in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Shuhuan Wen

    2012-01-01

    Full Text Available Recently, there is an emerging trend of addressing “energy efficiency” aspect of wireless communications. It has been shown that cooperating users relay each other's information to improve data rates. The energy is limited in the wireless cellular network, but the mobile users refuse to relay. This paper presents an approach that encourages user cooperation in order to improve the energy efficiency. The game theory is an efficient method to solve such conflicts. We present a cellular framework in which two mobile users, who desire to communicate with a common base station, may cooperate via decode-and-forward relaying. In the case of imperfect information assumption, cooperative Nash dynamic game is used between the two users' cooperation to tackle the decision making problems: whether to cooperate and how to cooperate in wireless networks. The scheme based on “cooperative game theory” can achieve general pareto-optimal performance for cooperative games, and thus, maximize the entire system payoff while maintaining fairness.

  11. A novel error detection due to joint CRC aided denoise-and-forward network coding for two-way relay channels.

    Science.gov (United States)

    Cheng, Yulun; Yang, Longxiang

    2014-01-01

    In wireless two-way (TW) relay channels, denoise-and-forward (DNF) network coding (NC) is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP). To handle this issue, a novel joint cyclic redundancy code (CRC) check method (JCRC) is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold.

  12. A Novel Error Detection due to Joint CRC Aided Denoise-and-Forward Network Coding for Two-Way Relay Channels

    Directory of Open Access Journals (Sweden)

    Yulun Cheng

    2014-01-01

    Full Text Available In wireless two-way (TW relay channels, denoise-and-forward (DNF network coding (NC is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP. To handle this issue, a novel joint cyclic redundancy code (CRC check method (JCRC is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold.

  13. Application of ANFIS for Distance Relay Protection in Transmission Line

    National Research Council Canada - National Science Library

    Azriyenni Azriyenni; Mohd Wazir Mustafa

    2015-01-01

    .... There was applied ANFIS for distance relay protection particularly for transmission line. If a fault occurs during the transmission line identification caused by unwanted fault thus the power delivery to the consumer becomes not going well...

  14. Performance analysis of two-way DF relay selection techniques

    Directory of Open Access Journals (Sweden)

    Samer Alabed

    2016-09-01

    Full Text Available This work proposes novel bi-directional dual-relay selection techniques based on Alamouti space-time block coding (STBC using the decode and forward (DF protocol and analyzes their performance. In the proposed techniques, two- and the three-phase relaying schemes are used to perform bi-directional communication between the communicating terminals via two selected single-antenna relays that employ the Alamouti STBC in a distributed fashion to achieve diversity and orthogonalization of the channels and hence improve the reliability of the system and enable the use of a symbol-wise detector. Furthermore, the network coding strategy applied at all relays is not associated with any power wastage for broadcasting data already known at any terminal, resulting in improved overall performance at the terminals. Our simulations confirm the analytical results and show a substantially improved bit error rate (BER performance of our proposed techniques compared with the current state of the art.

  15. Study of Gaussian Relay Channels with Correlated Noises

    CERN Document Server

    Zhang, Lili; Goldsmith, Andrea J; Cui, Shuguang

    2010-01-01

    In this paper, we consider full-duplex and half-duplex Gaussian relay channels where the noises at the relay and destination are arbitrarily correlated. We first derive the capacity upper bound and the achievable rates with three existing schemes: Decode-and-Forward (DF), Compress-and-Forward (CF), and Amplify-and-Forward (AF). We present two capacity results under specific noise correlation coefficients, one being achieved by DF and the other being achieved by direct link transmission (or a special case of CF). The channel for the former capacity result is equivalent to the traditional Gaussian degraded relay channel and the latter corresponds to the Gaussian reversely-degraded relay channel. For CF and AF schemes, we show that their achievable rates are strictly decreasing functions over the negative correlation coefficient. Through numerical comparisons under different channel settings, we observe that although DF completely disregards the noise correlation while the other two can potentially exploit such ...

  16. TRACK AND FIELD FRESHMEN TECHNIKAL PREPARATION FOR RELAY RACE

    Directory of Open Access Journals (Sweden)

    Nadezhda Egorova

    2012-01-01

    Full Text Available Methods of relay race technical preparation of athletics freshmen in the course of Physical Training classes in higher education institutions on activ game base are represented in this paper.

  17. New results on performance analysis of opportunistic regenerative relaying

    KAUST Repository

    Tourki, Kamel

    2013-12-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may be unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the selected relay. We first derive the signal-to-noise (SNR) statistics for each hop, which are used to determine accurate closed form expressions for end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and end-to-end outage probability for a transmission rate R over Rayleigh fading channels. Furthermore, we evaluate the asymptotical performance and deduce the diversity order. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over linear network architecture. © 2013 Elsevier B.V.

  18. Error-rate performance analysis of opportunistic regenerative relaying

    KAUST Repository

    Tourki, Kamel

    2011-09-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can be considered unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We first derive the exact statistics of each hop, in terms of probability density function (PDF). Then, the PDFs are used to determine accurate closed form expressions for end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation where the detector may use maximum ration combining (MRC) or selection combining (SC). Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over linear network (LN) architecture and considering Rayleigh fading channels. © 2011 IEEE.

  19. Reliable quantum communication over a quantum relay channel

    Energy Technology Data Exchange (ETDEWEB)

    Gyongyosi, Laszlo, E-mail: gyongyosi@hit.bme.hu [Quantum Technologies Laboratory, Department of Telecommunications, Budapest University of Technology and Economics, 2 Magyar tudosok krt, Budapest, H-1117, Hungary and Information Systems Research Group, Mathematics and Natural Sciences, Hungarian Ac (Hungary); Imre, Sandor [Quantum Technologies Laboratory, Department of Telecommunications, Budapest University of Technology and Economics, 2 Magyar tudosok krt, Budapest, H-1117 (Hungary)

    2014-12-04

    We show that reliable quantum communication over an unreliable quantum relay channels is possible. The coding scheme combines the results on the superadditivity of quantum channels and the efficient quantum coding approaches.

  20. London 2012 Olympic Torch Relay: look & feel style guide

    OpenAIRE

    2016-01-01

    The guidelines issued by the London Organising Committee of the Olympic Games and Paralympic Games Ltd (“LOCOG”) provide standards, requirements and guidelines for use of the London 2012 Olympic Torch Relay Emblem (the “Emblem”).

  1. Overlay cognitive radio systems with adaptive two-way relaying

    KAUST Repository

    Hyadi, Amal

    2013-12-01

    In this paper, we propose a spectrum sharing mechanism with a two-phase two-way relaying protocol for an overlay cognitive network. The system comprises two primary users (PUs) and two secondary users (SUs). One of the SUs acts as a relay for the PUs and gains spectrum sharing as long as he respects outage probability constraints of the primary system. Moreover, we consider that the relaying node performs an optimal power allocation scheme that minimizes the outage performance of the secondary receiver. Closed form expressions for the outage probability are derived for the cases of Decode-and-Forward (DF), Amplify-and-Forward (AF), and adaptive relaying. Numerical simulations are presented to illustrate and compare the obtained results. © 2013 IEEE.

  2. Educational Software Tool for Protection System Engineers. Distance Relay

    Directory of Open Access Journals (Sweden)

    Trujillo-Guajardo L.A.

    2012-04-01

    Full Text Available In this article, a graphical software tool is presented; this tool is based on the education of protection system engineers. The theoretical fundaments used for the design of operation characteristics of distance relays and their algorithms are presented. The software allows the evaluation and analysis of real time events or simulated ones of every stage of design of the distance relay. Some example cases are presented to illustrate the activities that could be done with the graphical software tool developed.

  3. Data Relay Satellites and remote sensing

    Science.gov (United States)

    Kingwell, Jeff

    1988-05-01

    Issues concerning the operation and use of Data Relay Satellites (DRS) are discussed. Advantages of instituting DRS systems include continuous direct access to large amounts of data, frequent contact with satellites for TTC activities, and the ability to initiate global scientific observation to improve weather forecasting. DRS systems would allow for better control of ballistic missles and would reduce costs for commercial information-based business operations. Disadvantages of fully replacing direct transmissions with DRS include the fact that DRS would make present facilities obsolete, would lead to an increased risk of countries being able to obtain access to data of their own territory, could possibly allow operators to control the release of processed information, would use uniform processing techniques that might not meet the needs of every nation, might lead to an increase in the price of obtaining data in order to cover the high cost of implementing a DRS system, and would increase the chance of data loss and service delays if direct downlinking were not used as a backup.

  4. CERN Relay Race: a great success!

    CERN Multimedia

    Staff Association

    2017-01-01

    Thursday 1st June marked the traditional Relay Race at CERN, organised jointly by the Running Club and the CERN Staff Association. Once again, the Race lived up to the expectations and the number of participants came close to last year’s all-time high with no less than 715 entries across different categories! In total 116 teams of 6 runners and 19 walkers completed the course at the Meyrin site in bright sunshine. Congratulations to all of them! Our Director-General gave the starting signal for the Race, demonstrating the interest in this event at the highest level of the Organization. Thank you for this much appreciated commitment! Moreover, a number of very high-level runners came to spice up this 2017 edition. The 1000-meter race was a tight one between Alexandre Roche (top 5 in the “Tour du canton”) and Baptiste Fieux who tore up the race at 2’36 and 2’42 respectively. Baptiste passed the baton to Pierre Baqué, the winner of the 2015 Saint&a...

  5. CERN Relay Race: a great success!

    CERN Multimedia

    Staff Association

    2016-01-01

    On Thursday May 19, the traditional relay race was held at CERN, organised jointly by the Running Club and the CERN Staff Association. In spite of the less than optimal weather, the 127 registered teams were not discouraged. Warmed by their efforts on the roads of CERN, the participants were able to withstand the chilly May weather. The start signal for the race was given by our Director General, demonstrating the interest in this event at the highest level of the Organization. Thank you for this much appreciated commitment! Can we hope for next year to see a team from the Directorate in the race? The many spectators who had come to cheer on the runners could also visit the stalls staffed by a few clubs and some of Interfon’s commercial partners. Refreshment and food stands contributed to the friendly atmosphere. The organisation of such an event requires however a substantial investment in order to cover all aspects of logistics, from preparation before the race, to the actual establishment ...

  6. Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels

    Directory of Open Access Journals (Sweden)

    Vaneet Aggarwal

    2009-01-01

    Full Text Available The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogonal channels such that the destination also receives transmissions from the relay on its channel. The eavesdropper can overhear either one or both of the orthogonal channels. Inner and outer bounds on the secrecy capacity are developed for both the discrete memoryless and the Gaussian channel models. For the discrete memoryless case, the secrecy capacity is shown to be achieved by a partial decode-and-forward (PDF scheme when the eavesdropper can overhear only one of the two orthogonal channels. Two new outer bounds are presented for the Gaussian model using recent capacity results for a Gaussian multiantenna point-to-point channel with a multiantenna eavesdropper. The outer bounds are shown to be tight for two subclasses of channels. The first subclass is one in which the source and relay are clustered, and the eavesdropper receives signals only on the channel from the source and the relay to the destination, for which the PDF strategy is optimal. The second is a subclass in which the source does not transmit to the relay, for which a noise-forwarding strategy is optimal.

  7. Modeling and Simulation of Out of Step Blocking Relay for

    Directory of Open Access Journals (Sweden)

    Ahmed A. Al Adwani

    2013-05-01

    Full Text Available  This paper investigates a power swing effect on a distance protection relay performance installed on (HV/EHV transmission line as well as power system stability. A conventional distance relay can’t properly operate under transient stability conditions; therefore, it cause mol-operation, and it will adversely impact on its trip signals. To overcome this problem, the Out Of Step (OOS relay has modeled and simulated to joint with distance relay to supervise and control on its trip signals response. The setting characteristics technique of the OOS based on concentric polygons scheme method to detect power swing under transient stability situation.         This study ia a modeling and simulating using (Maltab\\ Simulink software. A Two relays had been  performed   and  tested  with  two equivalents network connected to ends.      The results of this study showed an activity and reliability of this way to control the distance relay response under a transient stability conditions and it indicated the possibility to find out faults which may occur at period of power swing

  8. Wireless Intrusion Prevention Systems

    Directory of Open Access Journals (Sweden)

    Jack TIMOFTE

    2008-01-01

    Full Text Available The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its range to passively monitor the traffic or even start an attack. One of the countermeasures can be the use of Wireless Intrusion Prevention Systems.

  9. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  10. A SDP based design of relay precoding for the power minimization of MIMO AF-relay networks

    KAUST Repository

    Rao, Anlei

    2015-09-11

    Relay precoding for multiple-input and multiple-output (MIMO) relay networks has been approached by either optimizing the efficiency performance with given power consumption constraints or minimizing the power consumption with quality-of-service (QoS) requirements. For the later type design, previous works has worked on minimizing the approximated power consumption. In this paper, exact power consumption for all relays is derived into a quadratic form by diagonalizing the minimum-square error (MSE) matrix, and the relay precoding matrix is designed by optimizing this quadratic form with the help of semidefinite programming (SDP) relaxation. Our simulation results show that such a design can achieve a gain of around 3 dB against the previous design, which optimized the approximated power consumption. © 2015 IEEE.

  11. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  12. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  13. Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

    CERN Document Server

    Saad, Walid; Basar, Tamer; Debbah, Merouane; Hjørungnes, Are

    2010-01-01

    Autonomous wireless agents such as unmanned aerial vehicles or mobile base stations present a great potential for deployment in next-generation wireless networks. While current literature has been mainly focused on the use of agents within robotics or software applications, we propose a novel usage model for self-organizing agents suited to wireless networks. In the proposed model, a number of agents are required to collect data from several arbitrarily located tasks. Each task represents a queue of packets that require collection and subsequent wireless transmission by the agents to a central receiver. The problem is modeled as a hedonic coalition formation game between the agents and the tasks that interact in order to form disjoint coalitions. Each formed coalition is modeled as a polling system consisting of a number of agents which move between the different tasks present in the coalition, collect and transmit the packets. Within each coalition, some agents can also take the role of a relay for improving...

  14. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond

    KAUST Repository

    Nam, Sung Sik

    2016-11-29

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment. Copyright: © 2016 Nam et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

  15. Sum-Rate Enhancement in Multiuser MIMO Decode-and-Forward Relay Broadcasting Channel with Energy Harvesting Relays

    KAUST Repository

    Benkhelifa, Fatma

    2016-09-20

    In this paper, we consider a multiuser multipleinput multiple-output (MIMO) decode-and-forward (DF) relay broadcasting channel (BC) with single source, multiple energy harvesting (EH) relays and multiple destinations. All the nodes are equipped with multiple antennas. The EH and information decoding (ID) tasks at the relays and destinations are separated over the time, which is termed as the time switching (TS) scheme. As optimal solutions for the sum-rate maximization problems of BC channels and the MIMO interference channels are hard to obtain, the end-to-end sum rate maximization problem of a multiuser MIMO DF relay BC channel is even harder. In this paper, we propose to tackle a simplified problem where we employ the block diagonalization (BD) procedure at the source, and we mitigate the interference between the relaydestination channels using an algorithm similar to the BD method. In order to show the relevance of our low complex proposed solution, we compare it to the minimum mean-square error (MMSE) solution that was shown in the literature to be equivalent to the solution of the sum-rate maximization in MIMO broadcasting interfering channels. We also investigate the time division multiple access (TDMA) solution which separates all the information transmissions from the source to the relays and from the relays to the destinations over time. We provide numerical results to show the relevance of our proposed solution, in comparison with the no co-channel interference (CCI) case, the TDMA based solution and the MMSE based solution.

  16. Multi-hop Communication in the Uplink for LPWANs

    OpenAIRE

    Barrachina, Sergio; Bellalta, Boris; Adame, Toni; Bel, Albert

    2016-01-01

    Low-Power Wide Area Networks (LPWANs) have arisen as a promising communication technology for supporting Internet of Things (IoT) services due to their low power operation, wide coverage range, low cost and scalability. However, most LPWAN solutions like SIGFOX or LoRaWAN rely on star topology networks, where stations (STAs) transmit directly to the gateway (GW), which often leads to rapid battery depletion in STAs located far from it. In this work, we analyze the impact on LPWANs energy cons...

  17. Ambient-Energy Powered Multi-Hop Internet of Things

    NARCIS (Netherlands)

    Rao, V.S.

    2017-01-01

    The Internet of Things (IoT) is one of the disruptive technologies in today’s connected world. The idea is to connect every thing to the Internet. IoT holds the key to many current and future technologies that will significantly influence the quality and sustainability of life. The vision of IoT is

  18. An Efficient Radio Access Control Mechanism for Wireless Network-On-Chip Architectures

    Directory of Open Access Journals (Sweden)

    Maurizio Palesi

    2015-03-01

    Full Text Available Modern systems-on-chip (SoCs today contain hundreds of cores, and this number is predicted to reach the thousands by the year 2020. As the number of communicating elements increases, there is a need for an efficient, scalable and reliable communication infrastructure. As technology geometries shrink to the deep submicron regime, however, the communication delay and power consumption of global interconnections become the major bottleneck. The network-on-chip (NoC design paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication issues, such as the performance limitations of long interconnects and integration of large number of cores on a chip. Recently, new communication technologies based on the NoC concept have emerged with the aim of improving the scalability limitations of conventional NoC-based architectures. Among them, wireless NoCs (WiNoCs use the radio medium for reducing the performance and energy penalties of long-range and multi-hop communications. As the radio medium can be accessed by a single transmitter at a time, a radio access control mechanism (RACM is needed. In this paper, we present a novel RACM, which allows one to improve both the performance and energy figures of the WiNoC. Experiments, carried out on both synthetic and real traffic scenarios, have shown the effectiveness of the proposed RACM. On average, a 30% reduction in communication delay and a 25% energy savings have been observed when the proposed RACM is applied to a known WiNoC architecture.

  19. FTUC: A Flooding Tree Uneven Clustering Protocol for a Wireless Sensor Network.

    Science.gov (United States)

    He, Wei; Pillement, Sebastien; Xu, Du

    2017-11-23

    Clustering is an efficient approach in a wireless sensor network (WSN) to reduce the energy consumption of nodes and to extend the lifetime of the network. Unfortunately, this approach requires that all cluster heads (CHs) transmit their data to the base station (BS), which gives rise to the long distance communications problem, and in multi-hop routing, the CHs near the BS have to forward data from other nodes that lead those CHs to die prematurely, creating the hot zones problem. Unequal clustering has been proposed to solve these problems. Most of the current algorithms elect CH only by considering their competition radius, leading to unevenly distributed cluster heads. Furthermore, global distances values are needed when calculating the competition radius, which is a tedious task in large networks. To face these problems, we propose a flooding tree uneven clustering protocol (FTUC) suited for large networks. Based on the construction of a tree type sub-network to calculate the minimum and maximum distances values of the network, we then apply the unequal cluster theory. We also introduce referenced position circles to evenly elect cluster heads. Therefore, cluster heads are elected depending on the node's residual energy and their distance to a referenced circle. FTUC builds the best inter-cluster communications route by evaluating a cluster head cost function to find the best next hop to the BS. The simulation results show that the FTUC algorithm decreases the energy consumption of the nodes and balances the global energy consumption effectively, thus extending the lifetime of the network.

  20. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  1. Debate: Wired versus Wireless.

    Science.gov (United States)

    Meeks, Glenn; Nair, Prakash

    2000-01-01

    Debates the issue of investing in wiring schools for desktop computer networks versus using laptops and wireless networks. Included are cost considerations and the value of technology for learning. Suggestions include using wireless networks for existing schools, hardwiring computers for new construction, and not using computers for elementary…

  2. Performance Analysis of Selective Decode-and-Forward Multinode Incremental Relaying with Maximal Ratio Combining

    KAUST Repository

    Hadjtaieb, Amir

    2013-09-12

    In this paper, we propose an incremental multinode relaying protocol with arbitrary N-relay nodes that allows an efficient use of the channel spectrum. The destination combines the received signals from the source and the relays using maximal ratio Combining (MRC). The transmission ends successfully once the accumulated signal-to-noise ratio (SNR) exceeds a predefined threshold. The number of relays participating in the transmission is adapted to the channel conditions based on the feedback from the destination. The use of incremental relaying allows obtaining a higher spectral efficiency. Moreover, the symbol error probability (SEP) performance is enhanced by using MRC at the relays. The use of MRC at the relays implies that each relay overhears the signals from the source and all previous relays and combines them using MRC. The proposed protocol differs from most of existing relaying protocol by the fact that it combines both incremental relaying and MRC at the relays for a multinode topology. Our analyses for a decode-and-forward mode show that: (i) compared to existing multinode relaying schemes, the proposed scheme can essentially achieve the same SEP performance but with less average number of time slots, (ii) compared to schemes without MRC at the relays, the proposed scheme can approximately achieve a 3 dB gain.

  3. Wireless communication with chaos.

    Science.gov (United States)

    Ren, Hai-Peng; Baptista, Murilo S; Grebogi, Celso

    2013-05-03

    The modern world fully relies on wireless communication. Because of intrinsic physical constraints of the wireless physical media (multipath, damping, and filtering), signals carrying information are strongly modified, preventing information from being transmitted with a high bit rate. We show that, though a chaotic signal is strongly modified by the wireless physical media, its Lyapunov exponents remain unaltered, suggesting that the information transmitted is not modified by the channel. For some particular chaotic signals, we have indeed proved that the dynamic description of both the transmitted and the received signals is identical and shown that the capacity of the chaos-based wireless channel is unaffected by the multipath propagation of the physical media. These physical properties of chaotic signals warrant an effective chaos-based wireless communication system.

  4. Commercialization and Standardization Progress Towards an Optical Communications Earth Relay

    Science.gov (United States)

    Edwards, Bernard L.; Israel, David J.

    2015-01-01

    NASA is planning to launch the next generation of a space based Earth relay in 2025 to join the current Space Network, consisting of Tracking and Data Relay Satellites in space and the corresponding infrastructure on Earth. While the requirements and architecture for that relay satellite are unknown at this time, NASA is investing in communications technologies that could be deployed to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in 2018 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the next generation space based relay. This paper will describe NASA efforts in the on-going commercialization of optical communications and the development of inter-operability standards. Both are seen as critical to making optical communications a reality on future NASA science and exploration missions. Commercialization is important because NASA would like to eventually be able to simply purchase an entire optical communications terminal from a commercial provider. Inter-operability standards are needed to ensure that optical communications terminals developed by one vendor are compatible with the terminals of another. International standards in optical communications would also allow the space missions of one nation to use the infrastructure of another.

  5. Learning relay start strategies in swimming: What feedback is best?

    Science.gov (United States)

    Fischer, Sebastian; Braun, Claudia; Kibele, Armin

    2017-04-01

    In the past, studies and book recommendations on relay starts in swimming have been predominantly focused on the change-over time (COT) as a performance criterion. Aside from the circular backswing start with parallel foot placement, few studies have analysed differences in the take-off movement including step approaches as well. Although trends could be identified, the results remained still somewhat inconclusive. In contrast, no study has examined as has examined whether a reduction of COT in between wall contact of the income swimmer and the take-off of the outgoing swimmer is an optimal relay start strategy, as advocated by various swimming experts. Therefore, the purpose of this study was to compare two different relay start strategies: offensive strategy minimizing COT and conservative strategy to maximize horizontal peak force (HPF). In this regard, a learning intervention with 24 elite-level swimmers (12 females, 12 male) was conducted to compare both strategies regarding relay start time, HPF and COT. Subjects were randomly assigned to two feedback groups: COT versus HPF at take-off. The results of this study showed a clear advantage for HPF feedback for relay start performance measured by wall contact of the incoming swimmer and head passage at 7.5 m of the outgoing swimmer. In addition, similar reductions in COTs were found in both training groups. In conclusion, swimmers should focus on force production rather than minimizing COT. For the latter, deteriorating consequences for force production must be considered.

  6. Efficient incremental relaying for packet transmission over fading channels

    KAUST Repository

    Fareed, Muhammad Mehboob

    2014-07-01

    In this paper, we propose a novel relaying scheme for packet transmission over fading channels, which improves the spectral efficiency of cooperative diversity systems by utilizing limited feedback from the destination. Our scheme capitalizes on the fact that relaying is only required when direct transmission suffers deep fading. We calculate the packet error rate for the proposed efficient incremental relaying (EIR) scheme with both amplify and forward and decode and forward relaying. We compare the performance of the EIR scheme with the threshold-based incremental relaying (TIR) scheme. It is shown that the efficiency of the TIR scheme is better for lower values of the threshold. However, the efficiency of the TIR scheme for higher values of threshold is outperformed by the EIR. In addition, three new threshold-based adaptive EIR are devised to further improve the efficiency of the EIR scheme. We calculate the packet error rate and the efficiency of these new schemes to provide the analytical insight. © 2014 IEEE.

  7. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    Science.gov (United States)

    Hy, Franklin; Gladden, Roy; Allard, Dan; Wallick, Michael

    2011-01-01

    Since the Mars Exploration Rovers (MER), Spirit and Opportunity, began their travels across the Martian surface in January of 2004, orbiting spacecraft such as the Mars 2001 Odyssey orbiter have relayed the majority of their collected scientific and operational data to and from Earth. From the beginning of those missions, it was evident that using orbiters to relay data to and from the surface of Mars was a vastly more efficient communications strategy in terms of power consumption and bandwidth compared to direct-to-Earth means. However, the coordination between the various spacecraft, which are largely managed independently and on differing commanding timelines, has always proven to be a challenge. Until recently, the ground operators of all these spacecraft have coordinated the movement of data through this network using a collection of ad hoc human interfaces and various, independent software tools. The Mars Relay Operations Service (MaROS) has been developed to manage the evolving needs of the Mars relay network, and specifically to standardize and integrate the relay planning and coordination data into a centralized infrastructure. This paper explores the journey of developing the MaROS system, from inception to delivery and acceptance by the Mars mission users.

  8. Alternate MIMO AF relaying networks with interference alignment: Spectral efficient protocol and linear filter design

    KAUST Repository

    Park, Kihong

    2013-02-01

    In this paper, we study a two-hop relaying network consisting of one source, one destination, and three amplify-and-forward (AF) relays with multiple antennas. To compensate for the capacity prelog factor loss of 1/2$ due to the half-duplex relaying, alternate transmission is performed among three relays, and the inter-relay interference due to the alternate relaying is aligned to make additional degrees of freedom. In addition, suboptimal linear filter designs at the nodes are proposed to maximize the achievable sum rate for different fading scenarios when the destination utilizes a minimum mean-square error filter. © 1967-2012 IEEE.

  9. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    modalities and (iv) system solutions with high end-user added value and cost benefits. The common thread is deployment and deployment evaluation. In particular, satisfaction of application requirements, involvement of the end-user in the design and deployment process, satisfactory system performance and user acceptance are concerns addressed in many of the contributions. The contributions form a valuable set, which help to identify the priorities for research in this burgeoning area: Robust, reliable and efficient data collection in embedded wireless multi-hop networks are essential elements in creating a true deploy-and-forget user experience. Maintaining full connectivity within a WSN, in a real world environment populated by other WSNs, WiFi networks or Bluetooth devices that constitute sources of interference is a key element in any application, but more so for those that are safety-critical, such as disaster response. Awareness of the effects of wireless channel, physical position and line-of-sight on received signal strength in real-world, outdoor environments will shape the design of many outdoor applications. Thus, the quantification of such effects is valuable knowledge for designers. Sensors' failure detection, scalability and commercialization are common challenges in many long-term monitoring applications; transferable solutions are evidenced here in the context of pollutant detection and water quality. Innovative, alternative thinking is often needed to achieve the desired long-lived networks when power-hungry sensors are foreseen components; in some instances, the very problems of wireless technology, such as RF irregularity, can be transformed into advantages. The importance of an iterative design and evaluation methodology—from analysis to simulation to real-life deployment—should be well understood by all WSN developers. The value of this is highlighted in the context of a challenging WPAN video-surveillance application based on a novel Nomadic Access

  10. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  11. Telecommunications Relay Support of the Mars Phoenix Lander Mission

    Science.gov (United States)

    Edwards, Charles D., Jr.; Erickson, James K.; Gladden, Roy E.; Guinn, Joseph R.; Ilott, Peter A.; Jai, Benhan; Johnston, Martin D.; Kornfeld, Richard P.; Martin-Mur, Tomas J.; McSmith, Gaylon W.; hide

    2010-01-01

    The Phoenix Lander, first of NASA's Mars Scout missions, arrived at the Red Planet on May 25, 2008. From the moment the lander separated from its interplanetary cruise stage shortly before entry, the spacecraft could no longer communicate directly with Earth, and was instead entirely dependent on UHF relay communications via an international network of orbiting Mars spacecraft, including NASA's 2001 Mars Odyssey (ODY) and Mars Reconnaissance Orbiter (MRO) spacecraft, as well as ESA's Mars Express (MEX) spacecraft. All three orbiters captured critical event telemetry and/or tracking data during Phoenix Entry, Descent and Landing. During the Phoenix surface mission, ODY and MRO provided command and telemetry services, far surpassing the original data return requirements. The availability of MEX as a backup relay asset enhanced the robustness of the surface relay plan. In addition to telecommunications services, Doppler tracking observables acquired on the UHF link yielded an accurate position for the Phoenix landing site.

  12. Exact performance analysis of decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel

    2010-06-01

    In this paper, we investigate a dual-hop decode-and-forward opportunistic relaying scheme where the source may or may not be able to communicate directly with the destination. In our study, we consider a regenerative relaying scheme in which the decision to cooperate takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive an exact closed-form expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact statistics of each hop. Unlike existing works where the analysis focused on high signal-to-noise ratio (SNR) regime, such results are important to enable the designers to take decisions regarding practical systems that operate at low SNR regime. We show that performance simulation results coincide with our analytical results.

  13. Bilayer Protograph Codes for Half-Duplex Relay Channels

    Science.gov (United States)

    Divsalar, Dariush; VanNguyen, Thuy; Nosratinia, Aria

    2013-01-01

    Direct to Earth return links are limited by the size and power of lander devices. A standard alternative is provided by a two-hops return link: a proximity link (from lander to orbiter relay) and a deep-space link (from orbiter relay to Earth). Although direct to Earth return links are limited by the size and power of lander devices, using an additional link and a proposed coding for relay channels, one can obtain a more reliable signal. Although significant progress has been made in the relay coding problem, existing codes must be painstakingly optimized to match to a single set of channel conditions, many of them do not offer easy encoding, and most of them do not have structured design. A high-performing LDPC (low-density parity-check) code for the relay channel addresses simultaneously two important issues: a code structure that allows low encoding complexity, and a flexible rate-compatible code that allows matching to various channel conditions. Most of the previous high-performance LDPC codes for the relay channel are tightly optimized for a given channel quality, and are not easily adapted without extensive re-optimization for various channel conditions. This code for the relay channel combines structured design and easy encoding with rate compatibility to allow adaptation to the three links involved in the relay channel, and furthermore offers very good performance. The proposed code is constructed by synthesizing a bilayer structure with a pro to graph. In addition to the contribution to relay encoding, an improved family of protograph codes was produced for the point-to-point AWGN (additive white Gaussian noise) channel whose high-rate members enjoy thresholds that are within 0.07 dB of capacity. These LDPC relay codes address three important issues in an integrative manner: low encoding complexity, modular structure allowing for easy design, and rate compatibility so that the code can be easily matched to a variety of channel conditions without extensive

  14. Quantum-Dot-Based Telecommunication-Wavelength Quantum Relay

    Science.gov (United States)

    Huwer, J.; Stevenson, R. M.; Skiba-Szymanska, J.; Ward, M. B.; Shields, A. J.; Felle, M.; Farrer, I.; Ritchie, D. A.; Penty, R. V.

    2017-08-01

    The development of quantum relays for long-haul and attack-proof quantum communication networks operating with weak coherent laser pulses requires entangled photon sources at telecommunication wavelengths with intrinsic single-photon emission for most practical implementations. Using a semiconductor quantum dot emitting entangled photon pairs in the telecommunication O band, we demonstrate a quantum relay fulfilling both of these conditions. The system achieves a maximum fidelity of 94.5% for implementation of a standard four-state protocol with input states generated by a laser. We further investigate robustness against frequency detuning of the narrow-band input and perform process tomography of the teleporter, revealing operation for arbitrary pure input states, with an average gate fidelity of 83.6%. The results highlight the potential of semiconductor light sources for compact and robust quantum-relay technology that is compatible with existing communication infrastructures.

  15. Accurate performance analysis of opportunistic decode-and-forward relaying

    KAUST Repository

    Tourki, Kamel

    2011-07-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may be considered unusable, and the destination may use a selection combining technique. We first derive the exact statistics of each hop, in terms of probability density function (PDF). Then, the PDFs are used to determine accurate closed form expressions for end-to-end outage probability for a transmission rate R. Furthermore, we evaluate the asymptotical performance analysis and the diversity order is deduced. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2011 IEEE.

  16. Outage analysis for underlay relay-assisted cognitive networks

    KAUST Repository

    Tourki, Kamel

    2012-12-01

    Cooperative relay technology was recently introduced into cognitive radio networks in order to enhance network capacity, scalability, and reliability of end-to-end communication. In this paper, we investigate an underlay cognitive network where the quality of service of the secondary link is maintained by triggering an opportunistic regenerative relaying once it falls under an unacceptable level. We first provide the exact cumulative density function (CDF) of received signal-to-noise (SNR) over each hop with co-located relays. Then, the CDFs are used to determine very accurate closed-form expression for the outage probability for a transmission rate R. We validate our analysis by showing that simulation results coincide with our analytical results in Rayleigh fading channels. © 2012 IEEE.

  17. Joint opportunistic scheduling and network coding for bidirectional relay channel

    KAUST Repository

    Shaqfeh, Mohammad

    2013-07-01

    In this paper, we consider a two-way communication system in which two users communicate with each other through an intermediate relay over block-fading channels. We investigate the optimal opportunistic scheduling scheme in order to maximize the long-term average transmission rate in the system assuming symmetric information flow between the two users. Based on the channel state information, the scheduler decides that either one of the users transmits to the relay, or the relay transmits to a single user or broadcasts to both users a combined version of the two users\\' transmitted information by using linear network coding. We obtain the optimal scheduling scheme by using the Lagrangian dual problem. Furthermore, in order to characterize the gains of network coding and opportunistic scheduling, we compare the achievable rate of the system versus suboptimal schemes in which the gains of network coding and opportunistic scheduling are partially exploited. © 2013 IEEE.

  18. Latest Changes to NASA's Laser Communication Relay Demonstration Project

    Science.gov (United States)

    Edwards, Bernard L.; Israel, David J.; Vithlani, Seema K.

    2018-01-01

    Over the last couple of years, NASA has been making changes to the Laser Communications Relay Demonstration Project (LCRD), a joint project between NASA's Goddard Space Flight Center (GSFC), the Jet Propulsion Laboratory, California Institute of Technology (JPL), and the Massachusetts Institute of Technology Lincoln Laboratory (MIT/LL). The changes made makes LCRD more like a future Earth relay system that has both high speed optical and radio frequency links. This will allow LCRD to demonstrate a more detailed concept of operations for a future operational mission critical Earth relay. LCRD is expected to launch in June 2019 and is expected to be followed a couple of years later with a prototype user terminal on the International Space Station. LCRD's architecture will allow it to serve as a testbed in space and this paper will provide an update of its planned capabilities and experiments.

  19. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  20. Time-Frequency Based Channel Estimation for High-Mobility OFDM Systems—Part II: Cooperative Relaying Case

    Directory of Open Access Journals (Sweden)

    Önen Erol

    2010-01-01

    Full Text Available We consider the estimation of time-varying channels for Cooperative Orthogonal Frequency Division Multiplexing (CO-OFDM systems. In the next generation mobile wireless communication systems, significant Doppler frequency shifts are expected the channel frequency response to vary in time. A time-invariant channel is assumed during the transmission of a symbol in the previous studies on CO-OFDM systems, which is not valid in high mobility cases. Estimation of channel parameters is required at the receiver to improve the performance of the system. We estimate the model parameters of the channel from a time-frequency representation of the received signal. We present two approaches for the CO-OFDM channel estimation problem where in the first approach, individual channels are estimated at the relay and destination whereas in the second one, the cascaded source-relay-destination channel is estimated at the destination. Simulation results show that the individual channel estimation approach has better performance in terms of MSE and BER; however it has higher computational cost compared to the cascaded approach.

  1. 75 FR 54040 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Science.gov (United States)

    2010-09-03

    ... No. 03-123; DA 10-1235] Telecommunications Relay Services and Speech-to-Speech Services for... waivers of certain Telecommunications Relay Services (TRS) mandatory minimum standards for Video Relay...

  2. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  3. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  4. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  5. Optical and wireless technologies

    CERN Document Server

    Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo

    2018-01-01

    This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.

  6. Resource allocation for relay assisted cognitive radio networks

    KAUST Repository

    Zafar, Ammar

    2012-09-16

    In this paper, we present two optimal resource allocation schemes that maximize throughput and symbol correct rate (SCR). The throughput and SCR are derived. The derived throughput and SCR are optimized with respect to the sensing time, the source transmission power and the relay transmission power. Numerical results show that the optimal sensing time is dependent on the primary user\\'s signal-to-noise-ratio (SNR). They also show that SCR increases with increase in the number of relays. © 2012 IEEE.

  7. On Buffer-Aided Multiple-Access Relay Channel

    DEFF Research Database (Denmark)

    Liu, Rongkuan; Popovski, Petar; Wang, Gang

    2016-01-01

    This letter treats uplink scenario where M user equipments (UEs) send to a base station (BS), possibly via a common relay station (RS) that is equipped with a buffer. This is a multiple-access relay channel aided by a buffer. We devise a protocol in which the transmission mode is selected...... adaptively, using the buffer at the RS in order to maximize the average system throughput. We consider the general case in which the RS and the BS can have limits on the maximal number of transmitters that can be received over the multiple access channel. In each slot, there are three type possible actions...

  8. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Science.gov (United States)

    2010-10-01

    ... Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP Relay... establishes that its program in no way conflicts with federal law. (2)Requirements for VRS and IP Relay...

  9. Secure Communication for Two-Way Relay Networks with Imperfect CSI

    National Research Council Canada - National Science Library

    Cong Sun; Ke Liu; Dahu Zheng; Wenbao Ai

    2017-01-01

    This paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI...

  10. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System

    KAUST Repository

    El Shafie, Ahmed

    2016-07-07

    This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying, namely randomize-and-forward and decode-andforward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.

  11. Interference alignment for degrees of freedom improvement in 3-relay half-duplex systems

    KAUST Repository

    Park, Seongho

    2011-12-01

    In a half-duplex relaying, the capacity pre-log factor is a major drawback in spectral efficiency. This paper proposes a linear precoding scheme and an alternate relaying protocol in a dual-hop half-duplex system where three relays help the communication between the source and the destination. In our proposed scheme, we consider a phase incoherent method in relays in which the source alternately transmits message signals to the different relays. In addition, we propose a linear interference alignment scheme which can eliminate the inter-relay interference resulted from the phase incoherence of relaying. Based on our analysis of degrees of freedom and our simulation results, we show that our proposed scheme achieves additional degrees of freedom compared to the conventional half-duplex relaying. © 2011 IEEE.

  12. A wireless sensor tag platform for container security and integrity

    Science.gov (United States)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    2011-04-01

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. This allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.

  13. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  14. Robust Power Allocation for Multi-Carrier Amplify-and-Forward Relaying Systems

    KAUST Repository

    Rao, Anlei

    2012-09-08

    It has been shown that adaptive power allocation can provide a substantial performance gain in wireless communication systems when perfect channel state information (CSI) is available at the transmitter. However when only imperfect CSI is available, the performance may degrade significantly, and as such robust power allocation schemes have been developed to minimize the effects of this degradation. In this paper, we investigate power allocation strategies for multicarrier systems, in which each subcarrier employs single amplify-and-forward (AF) relaying scheme. Optimal power allocation schemes are proposed by maximizing the approximated channel capacity under aggregate power constraint (APC) and separate power constraint (SPC). By comparison with the uniform power allocation scheme and the best channel power allocation scheme, we confirm that both the APC and SPC schemes achieve a performance gain over benchmark schemes. In addition, the impact of channel uncertainty is also considered in this paper by modeling the uncertainty regions as bounded sets, and results show that the uncertainty can degrade the worst-case performance significantly.

  15. Peculiarities of the relays intended for operating trip coils of the high-voltage circuit breakers

    Directory of Open Access Journals (Sweden)

    Gurevich Vladimir

    2007-01-01

    Full Text Available Parameters of the subminiature electromagnetic relays used as output elements in microprocessor relay protection, do not correspond to technical specifications on these relay protection. The reasons of this discrepancy are analyzed. Contradictions and discrepancies of the international standards in this area are considered. It is shown, that absence of clearness in standards and mistakes in technical specifications of manufacturers of microprocessor protection do not allow estimating correctly technical parameters and lead to decrease in reliability of relay protection.

  16. Hybrid reed: Solid-state devices are a new generation of protective relays

    Directory of Open Access Journals (Sweden)

    Gurevich Vladimir

    2007-01-01

    Full Text Available Research and development in the field of electromechanical protective relays has not been conducted for tens of years. Author’s approach allows viewing the problem of re-equipment of relay protection in a new way. In the author’s opinion combination of reed switches with magnetic circuits and semiconductor elements opens new avenues in development of the promising protective relays featuring reliability, simplicity and low cost. Examples of protective relays made with these elements are given below.

  17. The Capacity Region of the Restricted Two-Way Relay Channel with Any Deterministic Uplink

    CERN Document Server

    Ong, Lawrence

    2011-01-01

    This paper considers the two-way relay channel (TWRC) where two users communicate via a relay. For the restricted TWRC where the uplink from the users to the relay is any deterministic function and the downlink from the relay to the users is any arbitrary channel, the capacity region is obtained. The TWRC considered is restricted in the sense that each user can only transmit a function of its message.

  18. Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhu Han

    2009-01-01

    Full Text Available Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks, forms virtual MIMO system, and provides diversity gains. In this paper, wireless video transmission protocols are proposed, in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination, and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation, configuration of side information, subject to bandwidth and power constraints. For multiuser cases, most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition, it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.

  19. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  20. Development of a Relay Performance Web Tool for the Mars Network

    Science.gov (United States)

    Allard, Daniel A.; Edwards, Charles D.

    2009-01-01

    Modern Mars surface missions rely upon orbiting spacecraft to relay communications to and from Earth systems. An important component of this multi-mission relay process is the collection of relay performance statistics supporting strategic trend analysis and tactical anomaly identification and tracking.