Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Advanced Wireless Networks - 4G Technologies

.pdf
Скачиваний:
47
Добавлен:
17.08.2013
Размер:
21.94 Mб
Скачать

758 NETWORK INFORMATION THEORY

to have originating traffic for several destinations. Then a [(2TR1 , . . . , 2TRm ), T, Pe(T )] code with total power constraint Ptotal consists of the following:

(1) m independent random variables W (transmitted words TRl bits long) with P(Wl =

kl ) = 1/2

T Rl

 

 

TR

¯

, for any k

{1, 2, . . . , 2

}, = 1, . . . , m. For any i S, let Wi :=

 

 

¯

R

 

 

{W : s = i} and Ri :=

 

 

(2)Functions nodes i that

fi,t : Rt1

S and f j,t :

{ :s =i}

 

 

 

 

 

 

 

 

 

¯

t = 1, 2, . . . , T, for the

source

× {1, 2, . . . , 2T Ri } → R,

Rt1

R, t

=

2, . . . , T , for all the other nodes j /

S, such

 

 

 

 

 

 

¯

t = 1, 2, . . . , T

Xi (t) = fi,t (Yi (1), . . . , Yi (t 1), Wi ),

X j (1) = 0,

X j (t) = f j,t (Y j (1), . . . , Y j (t 1)), t = 2, 3, . . . , T

such that the following total power constraint holds:

 

 

 

 

 

 

1

 

T

 

 

 

 

 

 

 

 

 

 

 

 

 

Xi2(t) Ptotal

 

 

(19.47)

 

 

 

 

 

 

 

T

 

 

 

 

 

 

 

 

 

 

 

t=1 i N

 

 

 

 

(3)

m decoding functions

 

 

 

 

 

 

 

 

 

 

 

 

 

g :

RT

 

 

 

 

¯

|} → {1, 2, . . . , 2

TR

}

 

 

 

 

 

× {1, 2, . . . , |W d

 

 

 

for the

destination

nodes

 

of

the m source-destination

pairs

{(s , d ), =

 

 

 

¯

 

 

 

 

 

 

¯

 

 

 

 

1, . . . , m}, where |W d | is the number of different values W d can take. Note that

 

Wd may be empty.

 

 

 

 

 

 

 

 

 

 

(4)

The average probability of error:

 

 

 

 

 

 

(T )

:= Prob

 

ˆ

ˆ

ˆ

 

 

 

(19.48)

 

 

Pe

(W1,

W2, . . . , Wm ) =(W1, W2, . . . , Wm )

 

 

ˆ

 

T

¯

 

 

 

 

T

(1), Yd (2), . . . , Yd (T ) .

 

 

where W := g (Yd , Wd ), with

Yd := Yd

 

Definition 2

A rate vector (R1, . . . , Rm ) is said to be feasible for the m source-destination pairs (s , d ), = 1, . . . , m, with total power constraint Ptotal, if there exists a sequence of

[(2TR1 , . . . , 2TRm ), T, Pe(T )] codes satisfying the total power constraint Ptotal, such that Pe(T ) 0 as T → ∞.

The preceding definitions are presented with total power constraint Ptotal. If an individual power constraint Pind is placed on each node, then Equation (19.47) should be modified:

1

T

 

 

Xi2(t) Pind, for i N

(19.49)

T

 

t=1

 

and correspondingly modify the rest of the definitions to define the set of feasible rate vectors under an individual power constraint.

INFORMATION THEORY AND NETWORK ARCHITECTURES

759

19.3.3 The transport capacity

The capacity region, is the closure of the set of all such feasible vector rates. As in Section 19.2 we will, focus mainly on the distance-weighted sum of rates.

Definition 3

As in Section 19.2, the network’s transport capacity CT is

CT :=

 

m

sup

R · ρ

 

(R1,...,Rm ) feasible

=1

where ρ := ρs d is the distance between s and d , and R := Rs d . In the following, due to limited space, a number of results from information theory will be presented without the formal proof. For more details the reader is referred to Xie and Kumar [33].

19.3.4 Upper bounds under high attenuation

(r1) The transport capacity is bounded by the network’s total transmission power in media with γ > 0 or δ > 3.

For a single link (s, d), the rate R is bounded by the received power at d. In wireless networks, owing to mutual interference, the transport capacity is upper-bounded by the total transmitted power Ptotal used by the entire network.

In any planar network, with either positive absorption, i.e. γ > 0, or with path loss exponent δ > 3

 

 

 

 

CT

c1(γ , δ, ρmin)

· Ptotal

 

 

(19.50)

 

 

 

 

 

σ 2

 

 

 

 

where

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

22δ+7 log eeγρmin/2(2 eγρmin/2)

, if γ >

0

 

 

 

 

c1

(γ , δ, ρmin) :

=

 

δ2ρmin 2δ+1

(1 eγρmin/2)

 

 

(19.51)

 

 

 

22δ+5(3δ

8) log e

,

 

if γ

=

0 and δ > 3

 

 

 

(δ 2)2(δ 3)ρmin 2δ1

 

 

 

 

 

 

 

 

 

(r2) The transport capacity follows an O(n) scaling law under the individual power constraint, in media with γ > 0 or δ > 3.

Consider any planar network under the individual power constraint Pind. Suppose that either there is some absorption in the medium, i.e. γ > 0, or there is no absorption at all but the path loss exponent δ > 3. Then its transport capacity is upper-bounded as follows:

CT

c1(γ , δ, ρmin)Pind

· n

(19.52)

σ 2

where c1(γ , δ, ρmin) is given by Equation (19.51). As in the previous section we use notation:

f = O(g) if lim sup [ f (n)/g(n)] < +∞

n→+∞

760 NETWORK INFORMATION THEORY

f = (g) if g = O( f ); f = (g) if f = O(g) as well as g = O( f ). Thus, all O(·) results are upper bounds, all (·) results me lower bounds, and all (·) results are sharp order estimates for the transport capacity. For n nodes located in an area of A square meters, it is shown in Section 19.2 that the transport capacity is of order O[(An)] under a noninformation theoretic protocol model. If A itself grows like n, i.e. A = (n), then the scaling law is O[(An)] = O(n), which coincides with the information-theoretic scaling law here. In fact, A must grow at least this rate since nodes are separated by a minimum distance ρmin > 0, i.e. A = (n), and so the O(n) result here is slightly stronger than the O[(An)] result in the previous section.

(r3)

If either γ > 0 or δ > 2 in any linear network, then

 

 

 

 

 

 

 

 

 

 

 

 

CT

c2(γ , δ, ρmin)

· Ptotal

(19.53)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

σ 2

 

 

 

 

where

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2eγρ min log e

 

 

 

,

 

 

c

 

(γ , δ, ρ

 

) :

 

(1

e

γρ min)2(1

e

2γρ min)ρ

2δ1

if γ > 0

 

2

min

=

 

 

 

 

 

 

 

 

 

 

min

 

 

 

 

 

2δ(δ2 δ 1) log e

,

 

 

 

 

 

 

if γ = 0 and δ > 2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(δ

1)2(δ

2)ρ

2δ1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

min

 

 

 

 

 

 

 

 

(19.54)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(r4)

For any linear network, if either γ > 0 or δ > 2, then the transport capacity is

 

upper-bounded as follows:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CT

c2(γ , δ, ρmin)Pind

· n

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

σ 2

 

 

 

 

 

where c2(γ , δ, ρmin) is as in Equation (19.44).

19.3.5 Multihop and feasible lower bounds under high attenuation

The O(n) upper bound on transport capacity is tight for regular planar networks in media with γ > 0 or δ > 3, and it is achieved by multihop. The ‘multihop strategy’ is defined as the following. Let denote the set of all paths from source s to destination d , where by such a path π we mean a sequence (s = j0, j1, . . . , . . . , jz = d ) with jq =jr for q =r. The total traffic rate R to be provided to the source destination pair (s , d ) is split over the paths in in such a way that if traffic rate λπ 0 is to be carried over path π , then

π P λπ = R . On each path π , packets are relayed from node to next node. On each such hop, each packet is fully decoded, treating all interference as noise. Thus, only point- to-point coding is used, and no network coding or multiuser estimation is employed. Such a strategy is of great interest and it is currently the object of much protocol development activity.

The following result implies that, when γ > 0 or δ > 3, the sharp order of the transport capacity for a regular planar network is (n), and that it can be attained by multihop.

(r5) In a regular planar network with either γ > 0 or δ > 1, and individual power constraint Pind

CT S

e2γ Pind

· n

c3(γ , δ)Pind + σ 2

 

INFORMATION THEORY AND NETWORK ARCHITECTURES

761

where

 

 

 

 

 

 

 

 

 

4(1 + 4γ )e2γ 4e4γ

,

if γ > 0;

 

c3

(γ , δ) :

=

2γ (1 e2γ )

 

 

 

 

 

16δ2 + (2π 16)δ π

,

if γ = 0 and δ > 1

 

 

 

 

 

 

 

 

(δ 1)(2δ 1)

 

 

 

and S(x) denotes the Shannon function S(x) := log(1 + x) /2.

This order of distance weighted sum of rates is achievable by multihop. Multihop is order-optimal in a random scenario over a regular planar network in media with γ > 0 or δ > 3, providing some theoretical justification for its use in situations where traffic is diffused over the network.

Consider a regular planar network with either γ > 0 or δ > 1, and individual power constraint Pind. The n source–destination pairs are randomly chosen as follows: every source s is chosen as the node nearest to a randomly (uniformly i.i.d.) chosen point in the domain,

and similarly for every destination d . Then lim Prob [ R = c/(n log n) is feasible for

n→∞

every {1, 2, . . . , n}] = 1 for some c > 0. Consequently, a distance weighted sum of rates CT = [n/(log n)] is supported with probability approaching one as η → ∞. This is within a factor l/log n of the transport capacity (n) possible when δ > 3.

(r6) A vector of rates (R1, R2, . . . , Rm ) can be supported by multihop in a planar network in media with γ > 0 or δ > 1, if the traffic can be load balanced such that no node is overloaded and no hop is too long.

This is a fairly straightforward result saying nothing about order optimality, and is provided only in support of the above theme that multihop is an appropriate architecture for balanceable scenarios.

(r7) A set of rates (R1, R2, . . . Rm ) for a planar network can be supported by multihop if no hop is longer than a distance ρ¯ , and for every 1 i n, the traffic to be relayed by node i

m

 

 

 

 

e2γ ρ¯ Pind

 

λπ < S

 

 

 

=1 {π : node i belongs to π }

ρ¯

2δ [c4

(γ , δ, ρmin)Pind + σ 2]

 

where

 

 

 

 

 

 

 

 

23+2δ eγρmin

 

 

 

 

 

 

 

,

 

 

 

 

γρ1+2δ

 

if γ > 0

 

 

 

c4(γ , δ, ρmin) :=

min

 

 

 

 

 

22+2δ

,

if γ

=

0 and δ > 1

 

ρmin2δ (δ 1)

 

 

 

 

 

 

 

 

19.3.6 The low-attenuation regime

In this scenario no absorption, i.e. γ = 0, and small path loss exponent are assumed. In this case coherent relaying with interference subtraction (CRIS) is considered an interesting strategy for information transmission in the following scenarios. For a source–destination pair (s, d), the nodes are divided into groups, with the first group containing only the source, and the last group containing only the destination d. Call the higher numbered groups ‘downstream’ groups, although they need not actually be closer to the destination. Nodes

762 NETWORK INFORMATION THEORY

in group i, for 1 i k 1, dedicate a portion Pik of their power to coherently transmit for the benefit of node k and its downstream nodes. Each node k employs interference subtraction during decoding to subtract out the known portion of its received signal being transmitted by its downstream nodes.

(r8i) If there is no absorption, i.e. γ = 0, and the path loss exponent δ < 3/2, then even with a fixed total power Ptotal, any arbitrarily large transport capacity can be supported by CRIS in a regular planar network with a large enough number of nodes n.

(r8ii) If γ = 0 and δ < 1, then even with a fixed total power Ptotal, CRIS can support a fixed rate Rmin > 0 for any single source–destination pair in any regular planar network, irrespective of the distance between them.

A similar result exists for the regular linear networks.

(r9i) If γ = 0 and δ < 1, then even with a fixed total power Ptotal, any arbitrarily large transport capacity can be supported by CRIS in a regular linear network with a large enough number of nodes n.

(r9ii) If γ = 0 and δ < 1/2, then even with a fixed total power Ptotal, CRIS can support a fixed rate Rmin > 0 for any single source–destination pair in any regular linear network, irrespective of the distance between them.

A superlinear (nθ ) scaling law with 1 < θ < 2 is feasible for some linear networks when γ = 0 and δ < 1.

(r10) For γ = 0 and individual power constraint Pind for every 0.5 < δ < 1, and 1 < θ < 1, there is a family of linear networks for which the transport capacity is CT = (nθ ). This order optimal transport capacity is attained in these networks by CRIS.

19.3.7 The Gaussian multiple-relay channel

The results for the low-attenuation regime rely on the following results for the Gaussian multiple-relay channel. An example of a four-node network with two parallel relays as shown in Figure 19.12. Consider a network of n nodes with αi j the attenuation from node i to node j and i.i.d. additive N (0, σ 2) noise at each receiver. Each node has an upper bound on the power available to it, which may differ from node to node. Suppose there is a single source-destination pair (s, d). We call this the Gaussian multiple relay channel.

The first result addresses the case where each relaying group consists of only one node. The strategy used is CRIS. Consider the Gaussian multiple-relay channel with coherent multistage relaying and interference subtraction. Consider M + 1 nodes, sequentially denoted

Y1 X1

X Y

Y2 X2

Figure 19.12 A four-node network with two parallel relays [33].

INFORMATION THEORY AND NETWORK ARCHITECTURES

763

by 0, 1, . . . , M, with 0 as the source, M as the destination, and the other M 1 nodes serving as M 1 stages of relaying.

(r11) Any rate R satisfying the following inequality is achievable from 0 to M:

 

 

1

 

j

 

k1

2

 

 

 

 

 

 

 

R < min

 

 

 

 

 

 

S

 

 

 

1

i

 

0

αi j Pik

 

 

 

 

1jM

σ 2 k

=

=

 

 

 

 

 

 

 

 

 

 

 

 

 

 

where Pik 0 satisfies

M

Pik Pi .

 

 

 

 

 

 

k=i+1

 

 

 

 

 

 

For the network setting in (r11), Theorem 3.1 in Gupta and Kumar [36] shows that a rate R0 is achievable if there exist some {R1, R2, . . . , RM1} such that

 

 

 

 

RM1 < S PMR,M1

 

 

M

2

 

 

 

1

 

 

 

 

 

σ 2 + PMR,

 

 

 

 

 

 

 

 

 

 

 

 

=0

 

 

 

 

 

and

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

P R

 

 

 

 

 

 

 

 

 

 

 

P R

Rm

<

min

S

m+1,m

 

,

Rm+1

+ m

min

 

S

k,m

 

M

m1

 

m1

 

 

2

k

 

 

 

 

 

σ 2 + PmR+1,

 

 

 

 

 

+

 

 

σ 2 + PkR,

 

 

 

 

=0

 

 

 

 

 

 

 

 

 

 

 

=0

for each m = 0, 1, . . . , M 2, where

 

2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PkR, :=

 

 

, 0 < k M.

 

 

 

 

αik

Pi,+1

 

 

 

 

i=0

 

 

 

 

 

 

 

 

 

 

 

 

From the above, recursively for m = M 2, M 1, . . . , 0, it is easy to prove that

 

 

 

 

 

 

 

 

 

m

1

1 j

1

Rm

<

 

min

 

S

σ 2

+

 

R

 

 

R

m

M

 

 

 

 

 

 

 

 

1

j

 

 

 

 

Pj,

k

 

 

 

Pj,k

 

 

 

+

 

 

 

 

=

0

=

m

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

For m = 0, this inequality is exactly (r11), showing a higher achievable rate. The right-hand side (RHS) in (r11) can be maximized over the choice of order of the M 1 intermediate nodes. The relaying can also be done by groups, and the next result addresses this. As above, maximization can be done over the assignment of nodes to the groups.

Consider again the Gaussian multiple-relay channel using coherent multistage relaying with interference subtraction. Consider any M + 1 groups of nodes sequentially denoted by N0, N1, . . . NM with N0 = {s} as the source, NM = {d} as the destination, and the other M 1 groups as M 1 stages of relay. Let ni be the number of nodes in group Ni , i {0, 1, . . . , M}. Let the power constraint for each node in group Ni be Pi /ni 0.

(r12) Any rate R satisfying the following inequality is achievable from s to d:

 

 

1

 

j

k1

2

 

 

 

 

 

 

R < 1 minj M

 

 

 

 

 

 

S

 

 

αNi N j Pik /ni · ni

 

 

 

 

 

 

 

 

σ

2

k

 

1 i

 

0

≤ ≤

 

 

 

 

=

=

 

 

 

 

 

 

 

 

 

 

 

 

 

 

where Pik 0 satisfies

M

 

 

Pik

Pi , and α Nx˙ N j := min{αk : k N i,

k=i+1

N j}, i, j {0, 1, . . . , M}.

As pointed out earlier, more on the results (r1)–(r12) can be found in Xie and Kumar [33].

764 NETWORK INFORMATION THEORY

19.4 COOPERATIVE TRANSMISSION IN WIRELESS MULTIHOP AD HOC NETWORKS

The technique discussed in this section allows us to transmit reliably to far destinations that the individual nodes are not able to reach without rapidly consuming their own battery resources, even when using multihop links discussed so far. The results are of interest in both ad hoc and sensor networks. The key idea is to have the nodes simply echo the source’s (leader) transmission operating as active scatterers while using adaptive receivers that acquire the equivalent network signatures corresponding to the echoed symbols. The active nodes in the network operate either as regenerative or nonregenerative relays. The intuition is that each of the waveforms will be enhanced by the accumulation of power due to the aggregate transmission of all the nodes while, if kept properly under control, the random errors or the receiver noise that propagate together with the useful signals will cause limited deterioration in the performance. The avalanche of signals triggered by the network leaders forms the so-called opportunistic large array (OLA).

In contrast to Sections 19.2 and 19.3, we are interested in this section in a method that utilizes the network as a distributed modem, where one or few sources are effectively transmitting data and all the other users are operating as repeaters. A fresh look into the concept of repeaters as a form of cooperative transmission came recently from References [37–40].

We will assume that, in a network of N nodes transmitting over a shared medium, each node is part of a multiple stage relay of a single source transmitting toward a remote receiver whose position is unknown to all the nodes. If no node in the network is powerful enough to communicate reliably with the remote receiver, the problem is referred to as the reach-back problem. Coordination among nodes in a large network is an extremely difficult task. In a cooperative transmission mechanism for which cooperation is obtained in a distributed fashion the source (leader) transmits a pulse with complex envelope pm (t) out of an M-ary set of waveforms. The resulting signal at the ith receiver is ri (t) = si,m (t) + ni (t) where si,m (t) is the network-generated signature of the mth symbol. If N nodes echo exactly the same symbol,

N

si,m (t) = Ai,n (t) pm t τi,n (t) , m = 0, . . . , M 1

n=1

where ni (t) is the ith receiver AWGN with variance N0, τi,n (t) is the delay of the link between the ith and the nth node, including the asynchronism of the beginning of transmission for each node n, and Ai,n (t) is the product of a complex fading coefficient ωi,n (t), the transmit power Pt and the channel average gain, e.g. (1 + di,n )αi,n (log–normal fading), where di,n is the distance, and αi,n the decay constant between the ith and nth nodes.

The following assumptions are used:

(a1) Ai,n (t) and τi,n (t) are constant over multiple symbol durations Ts ; the nodes are quasi-stationary for a time much greater than Ts .

(a2) The delays are τi,1 < τi,2 ≤ · · · ≤ τi,N , where the minimum delay τi,1 corresponds to the leader. To avoid ISI, the upper bound for the effective symbol rate is Rs = 1/ Ts 1/ τ , where τ is the maximum delay spread of si,m (t) for all i. The

COOPERATIVE TRANSMISSION IN WIRELESS MULTIHOP AD HOC NETWORKS

765

delay spread for node i is defined as

 

 

(t τ¯i )2 · Si,m (t) 2 dt

στ i =

 

−∞

 

 

 

 

Si,m (t) 2 dt

where the average delay

 

−∞

 

 

 

 

 

t · Si,m (t) 2 dt

τ¯i = −∞

Si,m (t) 2 dt

−∞

and thus, τ = maxi στi . Echoes that come from farther away are strongly attenuated (by dα ); therefore, the echoes received at node i are nonnegligible only for those coming from nodes within a certain distance d, which essentially depends on the transmit power and path loss. Hence, Rs can be increased by lowering the transmit power, capitalizing on spatial bandwidth reuse. In the reach back problem, however, the delay spread is τ supi [τi,N τi,1] because the receiver is roughly at the same distance from all nodes.

(a3) Ts is fixed for all nodes to c1 τ , where c1 is a constant taken to satisfy the ISI constraint. With (a3), we guarantee that no ambiguity will occur at the nodes in timing their responses. The transmission activity of the node is solely dependent on the signal that the node receives. Based on the evolution of si,m (t), we can distinguish two phases: (1) the earlier receive phase, when the upstream waves of signals approach the node, and (2) the period after the firing instant, which we call the rest phase, where the node hears the echoes of the downstream wave of signals fading away (for the regenerative case, the firing instant occurs shortly after the time when the node has accumulated enough energy to detect the signal). The switching between the two modes can be viewed as a very elementary form of time-division duplex (TDD).

(a4) The leader (and also the nodes in the regenerative case) transmits pulses with complex envelope pm (t) having limited double-sided bandwidth W and, approximately, duration Tp. By sampling at the Nyquist rate, Np = Tp W is the approximate length of the sequence { pm (k/ W )} of samples. Multipath propagation can be simply included in the model by increasing the number of terms in the summation in si,m (t); therefore, it does not require special attention. In fact, when we neglect the propagation of errors and noise that occurs in the case of regenerative and nonregenerative repeaters, respectively, the OLA itself is equivalent to a multipath channel, created by a set of active scatterers. In the regenerative case, the ideal OLA response is

gi (τ ) =

N

 

Ai,n δ(τ τi,n )

(19.55)

 

n=1

 

The nonregenerative OLA scattering model is more complex due to the feedback effect, which implies that not one but several signal contributions are scattered by each source.

766 NETWORK INFORMATION THEORY

The received OLA response is

gi (τ ) =

N

 

Ai,n δ(τ τi,n )

(19.55a)

 

n=1

 

For every possible path in the network, there is a contribution to the summation in Equation (19.55a) that has an amplitude equal to the product of all the path link gains traveled so far and a delay equal to the sum of all the path delays. Theoretically, the number of reflections N → ∞ because the signals and their amplified versions keep cycling in the network and adding up. If properly controlled, the contributions will keep adding up and then opportunistically serve the purpose of enhancing the signal. Hence, the key for the nonregenerative design is to control the noise that accompanies the useful signal. In both regenerative and nonregenerative cases, the received signal can be rewritten as the following convolution:

ri (t) = gi (t)* pm (t) + ni (t)

(19.56)

where gi (t) is the network impulse response, which is analogous to that of a multipath channel. Based on Equation (19.46), the idea is to let the nodes operate as regenerative and nonregenerative repeaters and avoid any complex coordination procedure to forward their signals at the network layer and share the bandwidth at the MAC layer. In addition, no channel state information is used. The information flow is carried forward using receivers that are capable of tracking the unknown network response gi (t) or, directly, the signature

waveforms i,m ( ) i ( )* m ( ). We should expect that the OLA behaves as a frequency- s t = g t p t

selective channel. Nodes’ mobility causes changes of the response gi (t) over time. If most of the network is stationary and N is large, the inertia of the system will be such that mobile nodes will cause small changes in gi (t).

Since the transmission channel is bandlimited with passband bandwidth W , the signature waveform pm (t) will have to be bandlimited and, therefore, uniquely expressible through its samples taken at the Nyquist rate 1/ Tc, where Tc = 1/ W . In general, pm (t) corresponds to a finite number of samples Np and is approximately time limited with duration Tp Np / W . Introducing the vectors pm , gi and ri such that

{pm }k = pm (kTc), k = 0, . . . Np 1

{gi }k = ∫ sinc(π W τ )gi (kTc + li TC τ )dτ, k = 0, . . . Ni 1

{ri }k = ri (kTc + li Tc)k = 0, . . . , Ni + Np 2 {ni }k = ni (kTc + li Tc), k = 0, . . . , Ni + Np 2

where Ni is the number of samples needed to represent gi (t), we have

Np 1

 

{ri }k =

{pm }n {gi }kn + {ni }k

 

n=0

 

By using the following Toeplitz convolution matrix:

 

{Gi }k,n = {gi }kn , n = 0, . . . , Np 1; k = 0, . . . , Ni + Np 2

 

we obtain

 

 

ri

= Gi pm + ni

(19.57)

COOPERATIVE TRANSMISSION IN WIRELESS MULTIHOP AD HOC NETWORKS

767

19.4.1 Transmission strategy and error propagation

The transmission of the OLA is led by a predetermined source node in the network. All the other nodes form multiple stages of relays to either flood the network with the information from the source, or just to pass the information to a remote receiver. The intermediate nodes in OLA have a choice of whether to relay or not, depending on the performance at that node. In the regenerative scheme, the OLA nodes has the choice of retransmitting its detected symbol or staying silent. Only nodes that are connected actively reply, where connectivity is defined as follows.

Definition 1

The ith regenerative node is connected if, based on its estimates of all possible signatures Gi pm and receiver noise variance, the pairwise symbol error probability of the ith receiver

not considering error propagation) is below a fixed upper-bound ε , i.e. max Pr{m μ} ≤

m

ε, μ =m, m = 0, . . . , M 1.

In the Ns samples contained in each symbol period, the time instant selected for the

detection and subsequent echo is the first sample ¯ i s at which the node is connected.

N N

If there is no such sample, the node will never echo the signal (but it may obviously detect the information at his own risk.)

In the nonregenerative scheme, every node that achieves the SNR constraint amplifies the signal coming from the other nodes as well as their receiver noise. Hence, the noise ni has a rather complex structure since it includes the noise that comes from every node that has transmitted previously and all its subsequent amplifications along with the signal. Since the geographical area in an ad hoc or sensor network is limited, the delay spread of each node response will also be limited, as far as the signal-to-noise contribution is concerned. Considerations on the SNR can be deduced by considering the inherent recursive structure of the signal composition. Details can found in Scaglione and Hong [40].

Definition 2

The ith nonregenerative node is said to be connected if the signal to noise ratio at the node

is above a fixed threshold ¯.

ξi ξi > ξ

19.4.2 OLA flooding algorithm

In this section, we compare numerically OLA with the more traditional ways of flooding the network described in Chapter 13. The flooding algorithm in Royer and Toh [41] is commonly indicated as one of the simplest ways of distributing information in the network or of searching for a path to the desired destination to initialize table-driven protocols. Some interesting alternatives are the probabilistic scheme [42] and the scalable broadcast algorithm [43]. Most of these methods require the MAC and physical layer to provide virtual transmission pipes (obtained typically with contention) that connect each pair of nodes, which imitates wired networks. The approach is legitimate but obviously inefficient. In fact, in solving the network broadcast problem, it is natural to utilize and integrate in the design the fact that wireless devices are physically broadcasting. This is precisely what happens in the OLA, where, contrary to the networking approaches, the transmission protocol and