The document presents an optimal polynomial time algorithm called ORA for solving the relay node assignment problem in cooperative ad hoc networks. The goal is to assign available relay nodes to multiple competing source-destination pairs in order to maximize the minimum data rate among all pairs.
The key contributions are:
1) Developing the ORA algorithm that uses a "linear marking" mechanism to achieve polynomial time complexity for relay node assignment.
2) Providing a formal proof that ORA finds the optimal solution.
3) Demonstrating via numerical results that ORA efficiently assigns relay nodes to maximize the minimum data rate.
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
Abstract Network capacity is an important factor to measure the performance of a network. Cooperative networking is a phenomenon which helps network to have significant gains in terms of transmission reliability and network capacity. Cooperating networking has been applied to multi-hop ad hoc networks. However, the existing works have two limitations. They support only single antenna model and three node relay scheme. The reason behind this limitation due to lack of complete understands of optimal power allocation structure Multiple Input and Multiple Output (MIMO) cooperative networks. Recently Liu et al. studied structural properties with respect to MIMO cooperative networks in presence of node power constraints. Each power allocation at source follows corresponding MIMO structure so as to ensure optimal power allocation. They establish relationship between cooperative relay and pure relay to quantify performance gain. In this paper we did experiments on this concept. Our simulations reveal that the proposed system for cooperative network is able to achieve both transmission reliability and network capacity. Keywords –Cooperative networking, MIMO, optimal power allocation, transmission reliability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
Nowadays, with progress of technology in wireless communications and increase of wireless tools to establish
communication, and for sending and receiving data files especially multimedia files, ad hoc networks have received special attention.
Mobile communications are usable wherever communication infrastructure is limited or absent, or establishing an infrastructure is not
affordable. According to the ever increasing usage of these networks, in this article, attempts have been made to select some routs for
sending multimedia files in an ad hoc network by using fuzzy logic and paying attention to moving nodes, so that we can fulfill needs
for service quality in this kind of networks.
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
Abstract Network capacity is an important factor to measure the performance of a network. Cooperative networking is a phenomenon which helps network to have significant gains in terms of transmission reliability and network capacity. Cooperating networking has been applied to multi-hop ad hoc networks. However, the existing works have two limitations. They support only single antenna model and three node relay scheme. The reason behind this limitation due to lack of complete understands of optimal power allocation structure Multiple Input and Multiple Output (MIMO) cooperative networks. Recently Liu et al. studied structural properties with respect to MIMO cooperative networks in presence of node power constraints. Each power allocation at source follows corresponding MIMO structure so as to ensure optimal power allocation. They establish relationship between cooperative relay and pure relay to quantify performance gain. In this paper we did experiments on this concept. Our simulations reveal that the proposed system for cooperative network is able to achieve both transmission reliability and network capacity. Keywords –Cooperative networking, MIMO, optimal power allocation, transmission reliability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
Nowadays, with progress of technology in wireless communications and increase of wireless tools to establish
communication, and for sending and receiving data files especially multimedia files, ad hoc networks have received special attention.
Mobile communications are usable wherever communication infrastructure is limited or absent, or establishing an infrastructure is not
affordable. According to the ever increasing usage of these networks, in this article, attempts have been made to select some routs for
sending multimedia files in an ad hoc network by using fuzzy logic and paying attention to moving nodes, so that we can fulfill needs
for service quality in this kind of networks.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
With the increased use of real time applications, there is a need for improved network traffic and bandwidth management. Switches are being used by computer networks for enabling connection between those hosts which are not connected by a direct link. When two or more than two host attempt to transmit packet at the same time, collision in data packets occurred. In this paper an optimized performance of local area network in terms of collision count and some other parameter have been investigated using simulation model. Simulation results have been obtained in different network scenarios by varying the number of devices in the network.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
In this paper, we present a distributed flow-based
access scheme for slotted-time protocols, that prov
ides
proportional fairness in ad-hoc wireless networks u
nder constraints on the buffer overflow probabiliti
es at
each node. The proposed scheme requires local infor
mation exchange at the link-layer and end-to-end
information exchange at the transport-layer, and is
cast as a nonlinear program. A medium access contr
ol
protocol is said to be proportionally fair with res
pect to individual end-to-end flows in a network, i
f the
product of the end-to-end flow rates is maximized.
A key contribution of this work lies in the constru
ction of
a distributed dual approach that comes with low com
putational overhead. We discuss the convergence
properties of the proposed scheme and present simul
ation results to support our conclusions.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
Abstract : As the network size increases the probability of congestion occurrence at nodes increases. This is because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses. In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing (IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput and packet delivery fraction. Keywords- DSDV, Hybrid protocol, AODV, IAODV, MANET
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
This whitepaper gives a general overview of traditional IPv4 route selection and the challenges posed by the dynamics of the R&E community. Through a comparison with the commercial world, the authors illustrate the current problem and propose several solutions to mitigate the issues.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...cscpconf
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive. In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner. We present proofs of our algorithms as well as practical results and evaluations.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
Sell your essays online - College Homework Help and Online Tutoring.. 5 Websites Where You Can Sell Your Essays. How to Buy Essays Online: Tips to Select the Best Writing Company. Buying Essays Online: Cheap or Expensive Services? - ItSolutionStuff.com. Calaméo - How to buy best essay writing companies online. Is Buying an Essay Online Safe? | LegitWritingServices.com. Buy Essay Online: Original Essay from Expert Native Writers. #1 Sell your essays online. Pay For Expert Online Writing Service.. What To Do When Buying Essay Online. Online Essay For Sale At Affordable Price | Affiliate marketing, Essay .... Calaméo - Buying From An Online Essay Writing Service. How to Sell an Essay or Article: 21 Tips for Writing a Winning Cover .... The impact of online selling on small businesses Essay. Sell essays - Get Help From Custom College Essay Writing and Editing .... Sell old essays and study documents online - earn money up to $5000. How to Sell Your Personal Essay: A Simple, 3-Step Guide for Beginners. Everything You Need to Know About Buying Essay Online - Learn ESL. How to Buy Essays Online: The Ultimate Guide. Buy Essays Online Guide. Top 10 reasons to buy essays online. Buy essays online. How to Choose Buy Essay Online – Fregald ICN Limited. 5 Best Ways To Sell essay – شرکت پایش فرایند تسلا. Essay to buy online - The Writing Center.. Essay Accounts For Sale. Online assignment writing service. | PDF. Buy Essay Online: Cheap Prices for Professional Services | penessays.com. Buy Ready Essays Online! Buy Essay Online 100% Fast, Cheap, Safe. Sell your essays online - Purchase Custom Written Essays.. Buying Essays Online: Is It Safe and Legal? – Education Career. Is Buying Essays Online Safe or Legit? Tips not to get Caught. SELL ESSAYS ONLINE – wisityguz. 5 Reasons Why Buying Essays Online Is 100%% Secure.
Personal Belief Essay Example | Topics and Well Written Essays - 1000 words. Religions Essay | Essay on Religions for Students and Children in .... Essay About Religion Beliefs. values and beliefs essay.jpg. College Essay: Belief in god essay. Examples Of An Essay In Quotes. QuotesGram. Norms values and beliefs essay. School Essay: Values and beliefs essay. Cultural Beliefs Essay Example | Topics and Well Written Essays - 500 words. Principle beliefs of Christianity Essay | Studies of Religion II - Year .... Principle Beliefs of Judaism Essay | Covenant (Biblical) | Shema Yisrael. Definition Essay: Challenging a belief essay example. 008 Writing College Essay On Religion And Education Essays How To Start .... Core Beliefs Essay | PDF | Curriculum | Learning. (PDF) Understanding Beliefs: An Essay on the Methodology of the .... ≫ Compatibility between Scientific Views and Religious Beliefs Free .... Ontology and Epistemology: My Beliefs Essay Example | Topics and Well .... Christianity Full Essay, Ethics, Beliefs, Sacred Texts!!! | Studies of .... My religious beliefs essay - articleentitled.x.fc2.com. 15/15 Essay for Nature of Religion and Beliefs - Islam Answering the .... ≫ Belief System and Ways of Belief Formed Free Essay Sample on Samploon.com. 004 Belief Essay Ideas 007770243 2 ~ Thatsnotus. Filipino Values and Beliefs Free Essay Example. Religion essay: Describe the influence of religious traditions on the .... Belief essay religious system. My Values And Beliefs Essay. Belief essay topics - mfacourses887.web.fc2.com. Statement of informed beliefs essay. Beautiful Belief Essay Ideas ~ Thatsnotus. belief systems essay | Morality | Confucianism. Beliefs Essay Topics. Beliefs in Society. The importance of religion essay. Personal Belief Narrative Essay and Performance. The Relationship Between Beliefs, Values, Attitudes and Behaviours Beliefs Essay Beliefs Essay
More Related Content
Similar to An Optimal Algorithm For Relay Node Assignment In Cooperative Ad Hoc Networks
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
With the increased use of real time applications, there is a need for improved network traffic and bandwidth management. Switches are being used by computer networks for enabling connection between those hosts which are not connected by a direct link. When two or more than two host attempt to transmit packet at the same time, collision in data packets occurred. In this paper an optimized performance of local area network in terms of collision count and some other parameter have been investigated using simulation model. Simulation results have been obtained in different network scenarios by varying the number of devices in the network.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
In this paper, we present a distributed flow-based
access scheme for slotted-time protocols, that prov
ides
proportional fairness in ad-hoc wireless networks u
nder constraints on the buffer overflow probabiliti
es at
each node. The proposed scheme requires local infor
mation exchange at the link-layer and end-to-end
information exchange at the transport-layer, and is
cast as a nonlinear program. A medium access contr
ol
protocol is said to be proportionally fair with res
pect to individual end-to-end flows in a network, i
f the
product of the end-to-end flow rates is maximized.
A key contribution of this work lies in the constru
ction of
a distributed dual approach that comes with low com
putational overhead. We discuss the convergence
properties of the proposed scheme and present simul
ation results to support our conclusions.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
Abstract : As the network size increases the probability of congestion occurrence at nodes increases. This is because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses. In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing (IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput and packet delivery fraction. Keywords- DSDV, Hybrid protocol, AODV, IAODV, MANET
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
This whitepaper gives a general overview of traditional IPv4 route selection and the challenges posed by the dynamics of the R&E community. Through a comparison with the commercial world, the authors illustrate the current problem and propose several solutions to mitigate the issues.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...cscpconf
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive. In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner. We present proofs of our algorithms as well as practical results and evaluations.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
Similar to An Optimal Algorithm For Relay Node Assignment In Cooperative Ad Hoc Networks (20)
Sell your essays online - College Homework Help and Online Tutoring.. 5 Websites Where You Can Sell Your Essays. How to Buy Essays Online: Tips to Select the Best Writing Company. Buying Essays Online: Cheap or Expensive Services? - ItSolutionStuff.com. Calaméo - How to buy best essay writing companies online. Is Buying an Essay Online Safe? | LegitWritingServices.com. Buy Essay Online: Original Essay from Expert Native Writers. #1 Sell your essays online. Pay For Expert Online Writing Service.. What To Do When Buying Essay Online. Online Essay For Sale At Affordable Price | Affiliate marketing, Essay .... Calaméo - Buying From An Online Essay Writing Service. How to Sell an Essay or Article: 21 Tips for Writing a Winning Cover .... The impact of online selling on small businesses Essay. Sell essays - Get Help From Custom College Essay Writing and Editing .... Sell old essays and study documents online - earn money up to $5000. How to Sell Your Personal Essay: A Simple, 3-Step Guide for Beginners. Everything You Need to Know About Buying Essay Online - Learn ESL. How to Buy Essays Online: The Ultimate Guide. Buy Essays Online Guide. Top 10 reasons to buy essays online. Buy essays online. How to Choose Buy Essay Online – Fregald ICN Limited. 5 Best Ways To Sell essay – شرکت پایش فرایند تسلا. Essay to buy online - The Writing Center.. Essay Accounts For Sale. Online assignment writing service. | PDF. Buy Essay Online: Cheap Prices for Professional Services | penessays.com. Buy Ready Essays Online! Buy Essay Online 100% Fast, Cheap, Safe. Sell your essays online - Purchase Custom Written Essays.. Buying Essays Online: Is It Safe and Legal? – Education Career. Is Buying Essays Online Safe or Legit? Tips not to get Caught. SELL ESSAYS ONLINE – wisityguz. 5 Reasons Why Buying Essays Online Is 100%% Secure.
Personal Belief Essay Example | Topics and Well Written Essays - 1000 words. Religions Essay | Essay on Religions for Students and Children in .... Essay About Religion Beliefs. values and beliefs essay.jpg. College Essay: Belief in god essay. Examples Of An Essay In Quotes. QuotesGram. Norms values and beliefs essay. School Essay: Values and beliefs essay. Cultural Beliefs Essay Example | Topics and Well Written Essays - 500 words. Principle beliefs of Christianity Essay | Studies of Religion II - Year .... Principle Beliefs of Judaism Essay | Covenant (Biblical) | Shema Yisrael. Definition Essay: Challenging a belief essay example. 008 Writing College Essay On Religion And Education Essays How To Start .... Core Beliefs Essay | PDF | Curriculum | Learning. (PDF) Understanding Beliefs: An Essay on the Methodology of the .... ≫ Compatibility between Scientific Views and Religious Beliefs Free .... Ontology and Epistemology: My Beliefs Essay Example | Topics and Well .... Christianity Full Essay, Ethics, Beliefs, Sacred Texts!!! | Studies of .... My religious beliefs essay - articleentitled.x.fc2.com. 15/15 Essay for Nature of Religion and Beliefs - Islam Answering the .... ≫ Belief System and Ways of Belief Formed Free Essay Sample on Samploon.com. 004 Belief Essay Ideas 007770243 2 ~ Thatsnotus. Filipino Values and Beliefs Free Essay Example. Religion essay: Describe the influence of religious traditions on the .... Belief essay religious system. My Values And Beliefs Essay. Belief essay topics - mfacourses887.web.fc2.com. Statement of informed beliefs essay. Beautiful Belief Essay Ideas ~ Thatsnotus. belief systems essay | Morality | Confucianism. Beliefs Essay Topics. Beliefs in Society. The importance of religion essay. Personal Belief Narrative Essay and Performance. The Relationship Between Beliefs, Values, Attitudes and Behaviours Beliefs Essay Beliefs Essay
vincent van gogh essay | Vincent Van Gogh | Paintings. Vincent van Gogh Essay Example | Topics and Well Written Essays - 500 words. Visual arts Van Gogh essay/case study | Visual Arts - Year 11 HSC .... Vincent van Gogh (1853–1890) | Essay | The Metropolitan Museum of Art .... Vincent van Gogh (1853–1890): The Drawings | Essay | The Metropolitan .... Pin by Ellon Academy on ARTIST - Vincent Van Gogh | Van gogh art lesson .... Vincent Van Gogh Term Paper Example | Topics and Well Written Essays .... (PDF) Part One: An Essay on the life and times of Vincent Van Gogh .... Art Room 104: Van Gogh Rubric & Essay (More Common Core!). Starry Night - Van Gogh | Sky | Vincent Van Gogh. Vincent van gogh research paper - writersgroup416.web.fc2.com. Art essay on van gogh - essaysbank.x.fc2.com.
A Question of Women And Child Welfare Free Essay Example. Development of the Welfare State - PHDessay.com. Child Welfare Essay by Montessori Centre Wales | TpT. Common Welfare Theory Issues Essay Example | Topics and Well Written .... The Public Welfare Foundation Undergraduate Prize Essay | British .... essay on welfare of my society depends on my well being - Brainly.in. Science and Human Welfare - Essay. Gender and Social Welfare Essay Example | Topics and Well Written .... Social Policy Essays - Welfare State Development by Academic Answers .... Persuasive essay welfare reform - blueoniodia.x.fc2.com. Individual And Collective Choice And Social Welfare: Essays In Honor Of .... The Welfare State Essay Example | Topics and Well Written Essays - 1250 .... Social Welfare and Happiness Essay Example | Topics and Well Written .... Welfare System Essay [ View Full Essay for Free ]. Essay review: Social welfare or social control? | Zambezia. “Child Welfare” by Ian Mcewan Free Essay Example. Critical analysis of welfare schemes. (PDF) Consumer Welfare Theory as an Ethical Consideration:: An Essay on .... Welfare Reform Essay. understanding welfare - University Social studies - Marked by Teachers.com. Welfare Reform Issues Essay Example | Topics and Well Written Essays .... State and Social Welfare Essay Example | Topics and Well Written Essays .... Welfare Reform Affects Us All Essay Example | Topics and Well Written .... Welfare and Social Policy in Britain Since 1870: Essays in Honour of .... Beneficiaries of U.S. Welfare Programs Essay Example | Topics and Well .... Welfare state essay - Perks of Using Paper Writing Services. (PDF) Four essays on the child welfare system. Social Division of Welfare Essay Example | Topics and Well Written .... Welfare state in Great Britain Essay Example | Topics and Well Written .... Animal welfare essay - University Biological Sciences - Marked by .... A project report on labour welfare | Essay examples, Philosophy essays .... Social Policy and Welfare Essay Example | Topics and Well Written ... Welfare Essays Welfare Essays
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Thesis Statement for students diagnonsed withADHD.ppt
An Optimal Algorithm For Relay Node Assignment In Cooperative Ad Hoc Networks
1. 1
An Optimal Algorithm for Relay Node Assignment
in Cooperative Ad Hoc Networks
Sushant Sharma, Student Member, IEEE, Yi Shi, Member, IEEE, Y. Thomas Hou, Senior Member, IEEE,
Sastry Kompella, Member, IEEE
Abstract—Recently, cooperative communications, in the form
of having each node equipped with a single antenna and exploit
spatial diversity via some relay node’s antenna, is shown to
be a promising approach to increase data rates in wireless
networks. Under this communication paradigm, the choice of
a relay node (among a set of available relay nodes) is critical
in the overall network performance. In this paper, we study the
relay node assignment problem in a cooperative ad hoc network
environment, where multiple source-destination pairs compete
for the same pool of relay nodes in the network. Our objective is
to assign the available relay nodes to different source-destination
pairs so as to maximize the minimum data rate among all pairs.
The main contribution of this paper is the development of an
optimal polynomial time algorithm, called ORA, that achieves
this objective. A novel idea in this algorithm is a “linear marking”
mechanism, which maintains linear complexity of each iteration.
We give a formal proof of optimality for ORA and use numerical
results to demonstrate its capability.
Index Terms—Cooperative communications, relay node assign-
ment, achievable rate, ad hoc network, optimization.
I. INTRODUCTION
SPATIAL diversity, in the form of employing multiple
transceiver antennas, is shown to be very effective in
coping fading in wireless channel. However, equipping a wire-
less node with multiple antennas may not be practical, as the
footprint of multiple antennas may not fit on a wireless node
(particularly on a handheld wireless device). To achieve spatial
diversity without requiring multiple transceiver antennas on
the same node, the so-called cooperative communications has
been introduced [10], [16], [17]. Under cooperative communi-
cations, each node is equipped with only a single transceiver
and spatial diversity is achieved by exploiting the antenna on
another (cooperative) node in the network.
We consider two categories of cooperative communications,
namely, amplify-and-forward (AF) and decode-and-forward
(DF) [10]. Under AF, the cooperative relay node amplifies the
signal received from the information source before forwarding
Manuscript received May 26, 2009; revised January 29, 2010 and August
23, 2010; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor
S. Diggavi.
An abridged version of this paper was published in ACM MobiHoc 2008
under the title “Optimal Relay Assignment for Cooperative Communications”.
S. Sharma is with the Department of Computer Science, Virginia Poly-
technic Institute and State University, Blacksburg, VA 24061 USA (e-mail:
sushant@cs.vt.edu).
Y. Shi and Y.T. Hou are with the Bradley Department of Electrical and
Computer Engineering, Virginia Polytechnic Institute and State University,
Blacksburg, VA 24061 USA e-mail: (yshi@vt.edu; thou@vt.edu).
S. Kompella is with the Information Technology Division, US
Naval Research Laboratory, Washington, DC 20375 USA (e-mail: kom-
pella@itd.nrl.navy.mil).
it to the destination node. Under DF, the cooperative relay
node decodes the received signal, and re-encodes it before
forwarding it to the destination node. Regardless of AF or
DF, the choice of a relay node plays a critical role in the
performance of cooperative communications [1], [2], [24]. As
we shall see in Section III, an improperly chosen relay node
may offer a smaller data rate for a source-destination pair than
that under direct transmission.
In this paper, we study the relay node assignment problem
in a cooperative ad hoc network environment. Specifically,
we consider an ad hoc network where there are multiple
active source-destination pairs and the remaining nodes can be
exploited as relay nodes. We want to determine the optimal
assignment of relay nodes to the source-destination pairs so as
to maximize the minimum data rate among all pairs. Although
solution to this problem can be found via exhaustive search
(among all possible relay node assignments), the complexity
is exponential. Our goal in this paper is to find an algorithm
with polynomial-time complexity to solve this problem.
A. Main Contributions
In this paper, we study how to assign a set of relay nodes
to a set of source-destination pairs so as to maximize the
minimum achievable data rate among all the pairs. The main
contributions of this paper are the following.
• We develop an algorithm, called Optimal Relay Assign-
ment (ORA) algorithm, to solve the relay node assign-
ment problem. A novel idea in ORA is a “linear marking”
mechanism, which is able to offer a linear complexity at
each iteration. Due to this mechanism, ORA is able to
achieve polynomial time complexity.
• We offer a formal proof of optimality for the ORA
algorithm. The proof is based on contradiction and hinges
on a clever recursive trace-back of source nodes and relay
nodes in the solution by ORA and another hypothesized
better solution.
• We show a number of nice properties associated with
ORA. These include: (i) the algorithm works regardless
of whether the number of relay nodes in the network is
more than or less than the number of source-destination
pairs; (ii) the final achievable rate for each source-
destination pair is guaranteed to be no less than that
under direct transmissions; (iii) the algorithm is able to
find the optimal objective regardless of initial relay node
assignment.
2. Report Documentation Page
Form Approved
OMB No. 0704-0188
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington
VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it
does not display a currently valid OMB control number.
1. REPORT DATE
23 AUG 2010 2. REPORT TYPE
3. DATES COVERED
00-00-2010 to 00-00-2010
4. TITLE AND SUBTITLE
An Optimal Algorithm for Relay Node Assignment in Cooperative Ad
Hoc Networks
5a. CONTRACT NUMBER
5b. GRANT NUMBER
5c. PROGRAM ELEMENT NUMBER
6. AUTHOR(S) 5d. PROJECT NUMBER
5e. TASK NUMBER
5f. WORK UNIT NUMBER
7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)
Naval Research Laboratory,Information Technology
Division,Washington,DC,20375
8. PERFORMING ORGANIZATION
REPORT NUMBER
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S)
11. SPONSOR/MONITOR’S REPORT
NUMBER(S)
12. DISTRIBUTION/AVAILABILITY STATEMENT
Approved for public release; distribution unlimited
13. SUPPLEMENTARY NOTES
to appear in IEEE/ACM Transactions on Networking, Issue to be determined
14. ABSTRACT
Recently, cooperative communications, in the form of having each node equipped with a single antenna
and exploit spatial diversity via some relay node?s antenna, is shown to be a promising approach to
increase data rates in wireless networks. Under this communication paradigm, the choice of a relay node
(among a set of available relay nodes) is critical in the overall network performance. In this paper, we
study the relay node assignment problem in a cooperative ad hoc network environment, where multiple
source-destination pairs compete for the same pool of relay nodes in the network. Our objective is to assign
the available relay nodes to different source-destination pairs so as to maximize the minimum data rate
among all pairs. The main contribution of this paper is the development of an optimal polynomial time
algorithm, called ORA, that achieves this objective. A novel idea in this algorithm is a ?linear marking?
mechanism, which maintains linear complexity of each iteration. We give a formal proof of optimality for
ORA and use numerical results to demonstrate its capability.
15. SUBJECT TERMS
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF
ABSTRACT
Same as
Report (SAR)
18. NUMBER
OF PAGES
14
19a. NAME OF
RESPONSIBLE PERSON
a. REPORT
unclassified
b. ABSTRACT
unclassified
c. THIS PAGE
unclassified
Standard Form 298 (Rev. 8-98)
Prescribed by ANSI Std Z39-18
3. 2
• We provide a sketch of a possible implementation of the
ORA algorithm. Some practical issues and overhead in
the implementation are discussed.
B. Paper Organization
In Section II, we discuss related work and contrast them
with this paper. Section III gives a brief overview of coopera-
tive communications, so as to set the context of our study. In
Section IV, we describe the relay node assignment problem
in a cooperative ad hoc network environment. Section V
presents our ORA algorithm. In Section VI, we give a proof
of optimality for ORA. Section VII presents numerical results,
and Section VIII presents a sketch of how ORA can be
implemented. Section IX concludes this paper.
II. RELATED WORK
The concept of cooperative communications can be traced
back to the three-terminal communication channel (or a relay
channel) in [20] by Van Der Meulen. Shortly after, Cover and
El Gamal studied the general relay channel and established an
achievable lower bound for data transmission [4]. These two
seminal works laid down the foundation for the present-day
research on cooperative communications that can be broadly
classified into the following three categories.
(a) Physical Layer Schemes. Current research on CC aims
to exploit distributed antennas on other nodes in the network.
This has resulted in several protocols at the physical layer [5],
[7], [8], [10], [14], [16], [17]. These protocols describe various
ways through which nodes can cooperate at the physical layer.
In [10], Laneman et al. studied the mutual information
between a pair of nodes using a third cooperating node
under the so-called fixed relaying schemes (AF or DF). The
underlying physical layer model for CC in this paper is based
on these two schemes. In addition to fixed relaying schemes,
the authors also presented selection relaying, in which nodes
can switch between AF or DF (depending on instantaneous
channel conditions), and incremental relaying, which utilizes
limited feedback from the receiving node to further improve
the performance of CC.
In [7], Gunduz and Erkip studied an opportunistic coopera-
tion scheme in which a feedback channel among cooperating
nodes can be used to share channel state information and
help perform power control. The authors showed that the
performance of DF improves when power control is employed.
This kind of opportunistic DF is an alternative to the physical
layer fixed DF considered in our work.
Another alternative physical layer scheme could be the
delay-tolerant DF presented in [5]. In this delay-tolerant DF
scheme, distributed space-time codes are used to address the
issue of asynchrony (transmission delay) among cooperative
transmitters.
Additionally, in [8] and [14], authors studied multi-hop
cooperative protocols that involve cooperation among multiple
transmitting nodes along the path. In [16] and [17], the
authors performed an in-depth study on the practical issues
of implementing user cooperation in a conventional CDMA
system.
(b) Network Layer Schemes for Multi-hop Networks.
Recent efforts on CC at the network layer include [9], [15],
[22]. In [9], Khandani et al. studied minimum energy routing
problem (for a single message) by exploiting both wireless
broadcast advantage and CC. However, their proposed solu-
tions cannot provide any performance guarantee for general
ad hoc networks. In [22], Yeh and Berry aimed to generalize
the well known maximum differential backlog policy [18] in
the context of CC. They formulated a challenging nonlinear
program with exponential number of variables that character-
izes the network stability region, but only provided solutions
for a few simple network topologies. In [15], Scaglione et al.
proposed two architectures for multi-hop cooperative wireless
networks. Under these architectures, nodes in the network
can form multiple cooperative clusters. They showed that
the network connectivity can be improved by using such
cooperative clusters. However, problems related with optimal
routing and relay node assignment were not discussed in their
work.
(c) Relay Node Assignment for Ad hoc Networks. The
most relevant research to our work (i.e. relay node assignment)
include [1], [2], [13], [21], [24]. In [24], Zhao et al. showed
that for a single source-destination pair, in the presence of
multiple relay nodes, it is sufficient to choose one “best”
relay node, instead of multiple relay nodes. This result is
interesting, as it paves the way for research on assigning no
more than one relay node to a source-destination pair, which
is the setting that we have adopted in this paper. In [21],
Wang et al. showed how game theory can be used by a
single session to select the best cooperative relay node. In [1],
Bletsas et al. proposed a distributed scheme for relay node
selection based on the instantaneous channel conditions at the
relay node. In contrast to [1], [21], and [24], our paper is
not limited to a single-session, and considers the relay node
assignment for multiple competing sessions with the goal of
maximizing the minimum data rate among all of them. In [13],
Ng and Yu studied an important utility maximization problem
for the joint optimization of relay node selection, cooperative
communications, and resource allocation in a cellular network.
However, their solution procedure has non-polynomial running
time. In [2], Cai et al. studied relay node selection and power
allocation for AF-based wireless relay networks, and proposed
a heuristic solution. Additionally, both [2] and [13] have
different objectives from our work.
III. COOPERATIVE COMMUNICATIONS: A PRIMER
The essence of cooperative communications is best ex-
plained by a three-node example in Fig. 1. In this figure, node
s is the source node, node d is the destination node, and node
r is a relay node. Transmission from s to d is done on a frame-
by-frame basis. Within a frame, there are two time slots. In
the first time slot, source node s makes a transmission to the
destination node d. Due to the broadcast nature of wireless
communications, this transmission is also overheard by the
relay node r. In the second time slot, node r forwards the
data received in the first time slot to node d. Note that such a
two-slot structure is necessary for cooperative communications
due to the half-duplex nature of most wireless transceivers.
4. 3
r
s
d
Fig. 1. A three-node schematic for cooperative communication.
In this section, we give expressions for achievable data rate
under cooperative communications and direct transmissions
(i.e., no cooperation). For cooperative communications, we
consider both amplify-and-forward (AF) and decoded-and-
forward (DF) modes [10].
Amplify-and-Forward (AF) Under this mode, let hsd, hsr,
hrd capture the effects of path-loss, shadowing, and fading
between nodes s and d, s and r, and r and d, respectively.
Denote zd[1] and zd[2] the zero-mean background noise at
node d in the first time slot and second time slot, respectively,
both with variance σ2
d. Denote zr[1] the zero-mean background
noise at node r in the first time slot, with variance σ2
r .
Denote xs the signal transmitted by source node s in the
first time slot. Then the received signal at destination node d,
ysd, can be expressed as
ysd = hsdxs + zd[1] , (1)
and the received signal at the relay node r, ysr, is
ysr = hsrxs + zr[1] . (2)
In the second time slot, relay node r transmits to destination
node d. The received signal at d, yrd, can be expressed as
yrd = hrd · αr · ysr + zd[2] ,
where αr is the amplifying factor at relay node r and ysr is
given in (2). Thus, we have
yrd = hrdαr · (hsrxs + zr[1]) + zd[2] . (3)
The amplifying factor αr at relay node r should satisfy power
constraint α2
r(|hsr|2
Ps + σ2
r ) = Pr, where Ps and Pr are the
transmission powers at nodes s and r, respectively. So, αr is
given by
α2
r =
Pr
|hsr|2Ps + σ2
r
.
We can re-write (1), (2) and (3) into the following compact
matrix form
Y = Hxs + BZ ,
where
Y =
ysd
yrd
, H =
hsd
αrhrdhsr
,
B =
0 1 0
αrhrd 0 1
, and Z =
zr[1]
zd[1]
zd[2]
. (4)
It has been shown in [10] that the above channel, which
combines both direct path (s to d) and relay path (s to r to d),
can be modeled as a one-input, two-output complex Gaussian
noise channel. The achievable data rate CAF(s, r, d) from s to
d can be given by
CAF(s, r, d) =
W
2
log2[det(I+(PsHH†
)(BE[ZZ†
]B†
)−1
)] ,
(5)
where W is the bandwidth, det(·) is the determinant function,
I is the identity matrix, the superscript “†” represents the
complex conjugate transposition, and E[·] is the expectation
function.
After putting (4) into (5) and performing algebraic ma-
nipulations, we have CAF(s, r, d) =
W
2
log
1 +
Ps
σ2
d
|hsd|2
+
Ps|hsr|2
Pr|hrd|2
Psσ2
d|hsr|2 + Prσ2
r |hrd|2 + σ2
r σ2
d
. Denote SNRsd =
Ps
σ2
d
|hsd|2
, SNRsr = Ps
σ2
r
|hsr|2
, and SNRrd = Pr
σ2
d
|hrd|2
. We
have
CAF(s, r, d) = W · IAF(SNRsd, SNRsr, SNRrd) , (6)
where IAF(SNRsd, SNRsr, SNRrd) = 1
2 log2
1 + SNRsd
+ SNRsr·SNRrd
SNRsr+SNRrd+1
.
Decode-and-Forward (DF) Under this mode, relay node r
decodes and estimates the received signal from source node s
in the first time slot, and then transmits the estimated data to
destination node d in the second time slot. The achievable data
rate for DF under the two time-slot structure is given by [10]
as
CDF(s, r, d) = W · IDF(SNRsd, SNRsr, SNRrd) , (7)
where
IDF(SNRsd, SNRsr, SNRrd) =
1
2
min{log2(1 + SNRsr),
log2(1 + SNRsd + SNRrd)}. (8)
Note that IAF(·) and IDF(·) are increasing functions of Ps
and Pr, respectively. This suggests that, in order to achieve the
maximum data rate under either mode, both source node and
relay node should transmit at maximum power. In this paper,
we let Ps = Pr = P.
Direct Transmission When cooperative communications
(i.e., relay node) is not used, source node s transmits to
destination node d in both time slots. The achievable data rate
from node s to node d is
CD(s, d) = W log2(1 + SNRsd) .
Based on the above results, we have two observations.
First, comparing CAF (or CDF) to CD, it is hard to say that
cooperative communications is always better than the direct
transmission. In fact, a poor choice of relay node could make
the achievable data rate under cooperative communications to
be lower than that under direct transmission. This fact under-
lines the significance of relay node selection in cooperative
communications. Second, although AF and DF are different
mechanisms, the capacities for both of them have the same
form, i.e., a function of SNRsd, SNRsr, and SNRrd. Therefore,
a relay node assignment algorithm designed for AF is also
applicable for DF. In this paper, we develop a relay node
assignment algorithm for both AF and DF. Table I lists the
notation used in this paper.
5. 4
TABLE I
NOTATION
Symbol Definition
CR(si, rj ) Achievable rate for si-di pair when relay node rj is
used
CR(si, ∅) Achievable rate for si-di pair under direct transmission
Cmin The minimum rate among all source-destination
pairs
huv Effect of path-loss, shadowing, and fading from node
u to node v
Ns Set of source nodes in the network
Nr Set of relay nodes in the network
Ns = |Ns|, number of source nodes in the network
Nr = |Nr|, number of relay nodes in the network
N Number of all the nodes in the network
P Maximum transmission power
rj The j-th relay node, rj ∈ Nr
Rψ(si) The relay node assigned to si under ψ
si The i-th source node, si ∈ Ns
Sψ(rj) The source node that uses rj under ψ
SNRuv The signal noise ratio between nodes u and v
W Channel bandwidth
xs Signal transmitted by node s
yuv Received signal at node v (form node u)
zv[t] Background noise at node v during time slot t
αr Amplifying factor at relay r
σ2
v Variance of background noise at node v
ψ A solution for relay node assignment
IV. THE RELAY NODE ASSIGNMENT PROBLEM
Based on the background in the last section, we consider
relay node assignment problem in a network setting. There
are N nodes in an ad hoc network, with each node being
either a source node, a destination node, or a potential relay
node (see Fig. 2). In order to avoid interference, we assume
that orthogonal channels are available in the network (e.g.,
using OFDMA), which is proposed for cooperative communi-
cations [10]. The channel gain from node u to v is captured by
variable huv. Denote Ns = {s1, s2, · · · , sNs } the set of source
nodes, Nd = {d1, d2, · · · , dNd
} the set of destination nodes,
and Nr = {r1, r2, · · · , rNr } the set of relays (see Fig. 2). We
consider unicast transmission where every source node si is
paired with a destination node di, i.e., Nd = Ns. We also
consider that each node is equipped with a single transceiver
and can transmit/receive within one channel at a time. We
assume that each node can only serve a unique role of source,
destination, or relay. That is, Nr = N − 2Ns. Further, we
assume that a session utilizes one relay node for CC [24].
Note that a source node may not always get a relay node.
There are two possible scenarios in which this may happen.
First, there may not be sufficient number of relay nodes in the
network (e.g., Nr Ns). In this case, some source nodes will
not have relay nodes. Second, even if there are enough relay
nodes, a sender may choose not to use a relay node if it leads
to a lower data rate than direct transmission (see discussion at
the end of Section III).
We now discuss the objective function of our problem.
Although different objectives can be used, a widely-used
objective for CC is to increase the achievable data rate of
individual sessions. For the multi-session network environment
considered in this paper (see Fig. 2), each source-destination
pair will have a different achievable data rate after we apply
a relay node assignment algorithm. So, a plausible objective
is to maximize the minimum data rate among all the source-
Sender Receiver Potential Relay Node
Fig. 2. A cooperative ad hoc network consisting of source nodes, destination
nodes, and relay nodes.
destination pairs.
More formally, denote R(si) the relay node assigned to si,
and S(rj ) as the source node that uses rj. For both AF and
DF, the achievable data rate of the session can be written as
(see Section III)
WIR(SNRsi,di , SNRsi,R(si), SNRR(si),di
) ,
with IR(·) = IAF(·) when AF is employed, and IR(·) = IDF(·)
when DF is employed. In case si does not use a relay, we
denote R(si) = ∅, and the data rate is the achievable rate
under direct transmission, i.e.,
CR(si, ∅) = CD(si, di) .
Combining both these cases, we have
CR(si, R(si)) =
WIR(SNRsi,di , SNRsi,R(si),
SNRR(si),di
) if R(si) 6= ∅
W log(1 + SNRsi,di ) if R(si) = ∅
(9)
Note that we do not list di in function CR(si, R(si)) since for
each source node si, the corresponding destination node di is
deterministic.
Denote Cmin as our objective function, which is the mini-
mum rate among all source nodes. That is,
Cmin = min{CR(si, R(si)) : si ∈ Ns}.
Our objective is to find an optimal relay node assignment for
all the source-destination pairs such that Cmin is maximized.
In subsequent sections, we present a polynomial time so-
lution to the relay node assignment problem along with a
correctness proof.
V. AN OPTIMAL RELAY ASSIGNMENT ALGORITHM
A. Basic Idea
The optimal polynomial-time algorithm we will present is
called Optimal Relay Assignment (ORA) algorithm. Figure 3
shows the flow chart of the ORA algorithm.
Initially, the ORA algorithm starts with a random but
feasible relay node assignment. By feasible, we mean that
each source-destination pair can be assigned at most one relay
node and that a relay node can be assigned only once. Such
initial feasible assignment is easy to construct, e.g., direct
transmission between each source-destination pair (without the
use of a relay) is a special case of feasible assignment.
Starting with this initial assignment, ORA adjusts the as-
signment during each iteration, with the goal of increasing
the objective function Cmin. Specifically, during each iteration,
ORA identifies the source node that corresponds to Cmin.
6. 5
BEGIN
Better solution found.
NO
YES NO
Preprocessing, and
Initial relay assignment
Can we find
a better solution?
YES
NO
Start the search
Return
YES
Return
NO
END
YES
Mark this relay, and denote
its corresponding source as s
BEGIN
Find_Another_Relay(s )
YES
NO
Is this relay
already assigned?
Can we find an
unmarked relay for s
with data rate larger
than Cmin?
For s , use
Find_Another_Relay(s ) to
determine if another
relay can be
assigned
Identify the source s
with minimum data rate Cmin.
b
i
Clear marks on
all relays.
Use Find_Another_Relay(s ) to
improve the data rate of s ,
and return the outcome.
b
b
i
j
j
j
Fig. 3. A flow chart of the ORA algorithm.
Then, ORA helps this source node to search a better relay
such that this “bottleneck” data rate can be increased. In the
case that the selected relay is already assigned to another
source node, further adjustment of relay node for that source
node is necessary (so that its current relay can be released).
Such adjustment may have a chain effect on a number of
source nodes in the network. It is important that for any
adjustment made on a relay node, the affected source node
should still maintain a data rate larger than Cmin. There are
only two outcomes from such search in an iteration: (i) a better
assignment is found, in which case, ORA moves on to the next
iteration; or (ii) a better assignment cannot be found, in which
case, ORA terminates.
There are two key technical challenges we aim to address
in the design. First, for any non-optimal solution, the algo-
rithm should be able to find a better solution. As a result,
upon termination, the final assignment is optimal. Second,
its running time must be polynomial. We will show that
s
cannot find
another relay
3
s4
r
4
s
2
r2
6
r
1
r
3
5 5 6
7
cannot find
another relay
can be
assigned to
1
r r
r
s s s
6
s
Fig. 4. An example tree topology in ORA algorithm for finding a better
solution.
ORA addresses both problems successfully. Specifically, we
show the complexity of the ORA algorithm is polynomial
in Section V-D. We will also give a correctness proof of its
optimality in Section VI.
B. Algorithm Details
In the beginning, ORA algorithm performs a “preprocess-
ing” step. In this step, for each source-destination pair, the
source node si considers each relay node rj in the network
and computes the corresponding data rate CR(si, rj) by (9).
Each source node si also computes the rate CR(si, ∅) by (9)
under direct transmissions (i.e., without the use of a relay
node). After these computations, each source node si can
identify those relay nodes that can offer an increase in its
data rate compared to direct transmissions, i.e., those relays
with CR(si, rj) CR(si, ∅). Obviously, it only makes sense to
consider these relays for CC. In the case that no relay can offer
any increase of data rate compared to direct transmissions, we
will just employ direct transmissions for these source nodes.
After the preprocessing step, we enter the initial assignment
step. The objective of this step is to obtain an initial feasible
solution for ORA algorithm so that it can start its iteration.
In the pre-processing step, we have already identified the list
of relay nodes for each source node that can increase its data
rate compared to direct transmission. We can randomly assign
a relay node from this list to a source node. Note that once a
relay node is assigned to a source node, it cannot be assigned
again to another source node. Thus, if there is no relay node
available to a source node, then this source node will simply
employ direct transmission as its initial assignment. Upon the
completion of this assignment, each source node will have the
data rate no less than that under direct transmission.
The next step in the ORA algorithm is to find a better
assignment, which represents an iteration process. This is the
key step in the ORA algorithm. The detail of this step is shown
in the bottom portion of Fig. 3. As a starting point of this step,
ORA algorithm identifies the smallest data rate Cmin among
all sources. ORA algorithm aims to increase this minimum
rate for the corresponding source node, while having all other
source nodes maintain their data rates above Cmin. Without
loss of generality, we use Fig. 4 to illustrate a search process.
• Suppose ORA identifies that s1 has the smallest rate Cmin
under the current assignment (with relay node r1). Then
7. 6
s1 examines other relays with a rate larger than Cmin. If it
cannot find such a relay, then no better solution is found
and the ORA algorithm terminates.
In case of a tie, i.e., when two or more source nodes have
the same smallest data rate, the tie is broken by choosing
the source node with the highest node index.
• Otherwise, i.e., if there are better relays, we consider
these relays in the non-increasing order in terms of data
rate (should it be assigned to s1). That is, we try the relay
that can offer the maximum possible increase in data rate
first. In case of a tie, i.e., when two or more relay nodes
offer the same maximum data rate, the tie is broken by
choosing the relay node with the highest node index.
• Suppose that source node s1 considers relay node r2. If
this relay node is not yet assigned to any other source
node, then r2 can be immediately assigned to s1. In this
simple case, we find a better solution and the current
iteration is completed.
• Otherwise, i.e., r2 is already assigned to a source node,
say s2, we mark r2 to indicate that r2 is “under consid-
eration” and check whether r2 can be released by s2.
• To release r2, source node s2 needs to find another relay
(or use direct transmission) while making sure that such
new assignment still has its data rate larger than Cmin.
This process is identical to what we have done for s1,
with the only (but important) difference that s2 will not
consider a relay that has already been “marked”, as that
relay node has already been considered by a source node
encountered earlier in the search process of this iteration.
• Suppose that source node s2 now considers relay r3. If
this relay node is not yet assigned to any source node,
then r3 can be assigned to s2; r2 can be assigned to s1;
and the current iteration is completed. Moreover, if the
relay under consideration by s2 is the one that is being
used by the source node that initiated the iteration, i.e.,
relay r1, then it is easy to see that r1 can be taken away
from s1. A better solution, where r1 is assigned to s2,
and r2 is assigned to s1, is found and the current iteration
is completed. Otherwise, we mark r3 and check further
to see whether r3 can be released by its corresponding
source node, say s3. We also note that s2 can consider
direct transmission if it offers a data rate larger than Cmin.
• Suppose that s3 cannot find any “unmarked” relay that
offers a data rate larger than Cmin, and its data rate under
direct transmission is no more than Cmin. Then s2 cannot
use r3 as its relay.
• If any “unmarked” relay that offers a data rate larger
than Cmin cannot be assigned to s2, then s1 cannot use
r2 and will move on to consider the next relay on its
non-increasing rate list, say r4.
• The search continues, with relay nodes being marked
along the way, until a better solution is found or no better
solution can be found. For example, in Fig. 4, s6 finds
a new relay r7. As a result, we have a new assignment,
where r7 is assigned to s6; r6 is assigned to s4; and r4
is assigned to s1.
Note that the “mark” on a relay node will not be cleared
Main algorithm
1. Perform preprocessing and an initial relay node assignment.
2. Set all the relay nodes in the network as “unmarked”.
3. Denote sb the source node with Cmin,⋆ the smallest data
rate among all source nodes. The corresponding destination
node of sb is db and the corresponding relay node is R(sb).
4. Find Another Relay (sb, R(sb), Cmin).
5. If sb finds a better relay, then go to line 2.
6. Otherwise, the algorithm terminates.
Subroutines
Find Another Relay(S(rj ), rj, Cmin):
7. For every “unmarked” relay rk with CR(S(rj ), rk) Cmin,
do the following in the non-increasing order of CR(S(rj ), rk).⋆
8. Run Check Relay Availability(rk , Cmin).
9. If rk is available, then do the following:
10. Remove relay node rj ’s assignment to S(rj );
11. Assign relay node rk to S(rj ).
12. Otherwise, continue on to next rk and go to line 8.
13. If all relays are unavailable, then S(rj) cannot find another relay.
Check Relay Availability(rj , Cmin):
14. If rj is not assigned to any source node, then rj is available.
15. If rj = R(sb) or rj = ∅, then rj is available.
16. Otherwise,
17. Set rj as “marked”.
18. Run Find Another Relay (S(rj ), rj, Cmin).
19. If S(rj) can find another relay, then rj is available.
20. Otherwise rj is unavailable.
⋆ A tie is broken by choosing the node with the largest node index.
Fig. 5. Pseudocode for the ORA algorithm.
throughout the search process in the same iteration. We call
this the “linear marking” mechanism. These marks will only
be cleared when the current iteration terminates and before
the start of the next iteration. A pseudocode for the ORA
algorithm is shown in Fig. 5.
We now use an example to illustrate the operation of the
ORA algorithm, in particular, its “linear marking” mechanism.
Readers who already understood the ORA algorithm can skip
this example.
Example 1: Suppose that there are seven source-destination
pairs and seven relay nodes in the network.
Table II(a) shows the data rate for each source node si
when relay node rj is assigned to it. The symbol ∅ indicates
direct transmission. Also shown in Table II(a) is an initial
relay node assignment, which is indicated by an underscore
on the intersecting row (si) and column (rj). Note that the
preprocessing step before the initial assignment ensures that
the data rate for each source-destination pair in the initial
assignment is no less than that under direct transmission.
Under the initial relay node assignment in Table II(a), source
s3 is identified as the bottleneck source node sb with the
smallest rate of Cmin = 13. Since consideration of relay nodes
is performed in the order of non-increasing (from largest to
smallest) data rate for the source node under consideration,
r4 is therefore considered for s3. Since r4 is already assigned
to source node s2, we “mark” r4 now. Now s2 needs to find
another relay. But any other relay (or direct transmission) will
result in a data rate no greater than the current objective value
Cmin = 13. This means that r4 cannot be taken away from s2.
Since r4 does not work out for s3, s3 will then consider the
next relay node that offers the second largest data rate value,
i.e., relay node r7. Since r7 is already assigned to sender s4,
we “mark” r7 now. Next, ORA algorithm will check to see if
s4 can find another relay. It turns out that none of the relay
8. 7
TABLE II
AN EXAMPLE.
(a) Initial relay node assignment.
∅ r1 r2 r3 r4 r5 r6 r7
s1 14 7 24 5 14 15 17 9
s2 9 8 10 11 20 10 12 11
→ s3 11 10 13 17 21 8 9 19
s4 12 8 9 12 11 10 9 18
s5 10 9 18 19 24 9 13 23
s6 7 18 12 6 11 11 17 20
s7 16 1 9 4 14 19 8 12
(b) Assignment after the first iteration.
∅ r1 r2 r3 r4 r5 r6 r7
→ s1 14 7 24 5 14 15 17 9
s2 9 8 10 11 20 10 12 11
s3 11 10 13 17 21 8 9 19
s4 12 8 9 12 11 10 9 18
s5 10 9 18 19 24 9 13 23
s6 7 18 12 6 11 11 17 20
s7 16 1 9 4 14 19 8 12
(c) Assignment after the second iteration.
∅ r1 r2 r3 r4 r5 r6 r7
s1 14 7 24 5 14 15 17 9
s2 9 8 10 11 20 10 12 11
s3 11 10 13 17 21 8 9 19
s4 12 8 9 12 11 10 9 18
s5 10 9 18 19 24 9 13 23
s6 7 18 12 6 11 11 17 20
→ s7 16 1 9 4 14 19 8 12
(d) Final assignment upon termination.
∅ r1 r2 r3 r4 r5 r6 r7
s1 14 7 24 5 14 15 17 9
s2 9 8 10 11 20 10 12 11
→ s3 11 10 13 17 21 8 9 19
s4 12 8 9 12 11 10 9 18
s5 10 9 18 19 24 9 13 23
s6 7 18 12 6 11 11 17 20
s7 16 1 9 4 14 19 8 12
nodes except r7 can offer a data rate larger than the current
Cmin to s4. As a result, r7 cannot be taken away from s4.
Source node s3 will now check for the relay node that offers
next largest rate, i.e., r3. Since r3 is already assigned to sender
s5, we “mark” r3 now. Next, ORA algorithm checks to see if
s5 can find another relay. Then s5 checks relay nodes in non-
increasing order of data rate values. Since r4 (with largest
rate), r7 (with the second largest rate), and r3 (with the third
largest rate) are all marked, they will not be considered. The
relay with the fourth largest rate is r2, which offers a rate of
18 Cmin = 13. Moreover, r2 is the relay node assigned to
sb = s3. Thus, s5 can choose r2. The new assignment after
the first iteration is shown in Table II(b). Now the objective
value, Cmin, is updated to 15, which corresponds to s1. Before
the second iteration, all markings done in the first iteration are
cleared.
In the second iteration, ORA algorithm will identify s1 as
the source node with a minimum data rate in the network.
The algorithm will then perform a new search for a better
relay node for source s1. Similar to the first iteration, the
assignments for other source nodes can change during this
search process, but all assignments should result in data rates
larger than 15.
The iteration continues and the final assignment upon ter-
mination of ORA algorithm is shown in Table II(d), with the
optimal (maximum) value of Cmin being 17.
It should be clear that ORA works regardless of whether
Nr ≥ Ns or Nr Ns. For the latter case, i.e., the number of
relay nodes in the network is less than the number of source
nodes, it is only necessary to consider relay node assignment
for a reduced subset of Nr source nodes, where the data rate
of each source in this subset under direct transmission is less
than the data rate of those (Ns − Nr) source nodes not in this
subset. As a result, in the case of Ns Nr, ORA will run
even faster due to a smaller problem size.
C. Caveat on the Proposed Marking Mechanism
We now re-visit the marking mechanism in the ORA
algorithm. Although different marking mechanisms may be
designed to achieve the optimal objective, the algorithm
complexity under different marking mechanisms may differ
significantly. In this section, we first present a marking mech-
anism, which appears to be a natural approach but leads to an
exponential complexity for each iteration. Then we discuss our
proposed marking mechanism and show its linear complexity
for each iteration.
A natural approach is to perform both marking and un-
marking within an iteration. This approach is best explained
with an example. Again, let’s look at Fig. 4. Source node
s1 first considers r2. Since r2 is being considered by s1 in
the new solution and is used by s2 in the current solution,
r2 is marked. Source node s2 considers r3, which is already
assigned to s3. Since s3 cannot release r3 without reducing
its data rate below the current Cmin, this branch of search is
futile and s1 now considers a different relay node r4. Since
r4 is currently assigned to s4, we mark r4 and try to find a
new relay for s4. Now the question is: shall we remove those
marks on r2 and r3 that we put on earlier in the process within
this iteration? Under this natural approach, r2 and r3 should
be unmarked so that they can be considered as candidate
relay nodes for s4 in its search. Similarly, when we try to
find a relay for s6, relay nodes r2, r3, r4 and r5 should be
unmarked so that they can be considered as candidate relay
nodes for s6, in addition to r7. It is not hard to show that
such marking/unmarking mechanism will consider all possible
assignments and can guarantee to find an optimal solution
upon termination. However, the complexity of such approach
is exponential within each iteration.
In contrast, under the ORA algorithm, there is no unmarking
mechanism within an iteration. That is, relay nodes that are
marked earlier in the search process by some source nodes will
remain marked. As a result, any relay node will be considered
at most once in the search process, which leads to a linear
complexity for each iteration. Unmarking for all nodes is
performed only at the end of an iteration so that there is a
clean start for the next iteration.
An immediate question regarding our marking mechanism
is: how could such a “linear marking” lead to an optimal
solution, as it appears that many possible assignments that may
increase Cmin are not considered. This is precisely the question
that we will address in Section VI, where we will prove that
ORA can guarantee that its final solution is optimal.
9. 8
D. Complexity Analysis
We now analyze the computational complexity of ORA
algorithm. During each iteration, due to the “linear marking”
mechanism in our algorithm, a relay node is checked for
its availability at most once. Thus, the complexity of each
iteration is O(Nr).
Now we examine the maximum number of iterations that
ORA can execute. The number of improvements in data rate
that an individual source node can have is limited by Nr.
As a result, in worst case, the number of iterations that
the algorithm can go through are O(NsNr). This makes the
overall complexity of ORA algorithm to be O(NsN2
r ).
VI. PROOF OF OPTIMALITY
In this section, we give a correctness proof of the ORA
algorithm. That is, upon the termination of the ORA algorithm,
the solution (i.e., objective value and the corresponding relay
node assignment) is optimal.
Our proof is based on contradiction. Denote ψ the final
solution obtained by the ORA algorithm, with the objective
value being Cmin. For ψ, denote the relay node assigned to
source node si as Rψ(si). Conversely, for ψ, denote the source
node that uses relay node rj as Sψ(rj).
We now assume that there exists a solution ψ̂ better than ψ.
That is, the objective value by ψ̂, denoted as Ĉmin, is greater
than that by ψ, i.e., Ĉmin Cmin. For ψ̂, we denote the relay
node assigned to source node si as Rψ̂(si). Conversely, for ψ̂,
we denote the source node that uses relay node rj as Sψ̂(rj).
The key idea in the proof is to exploit the marking status
of relay nodes at the end of its last iteration, which is a non-
improving iteration. Specifically, in the beginning of this last
iteration, ORA will select a “bottleneck” source node, which
we denote as sb. ORA will then try to improve the solution
by searching for a better relay node for this bottleneck source
node. Since the last iteration is a non-improving iteration,
ORA will not find a better solution, and thus will terminate.
We will show that Rψ(sb) is not marked at the end of the last
iteration of ORA. On the other hand, by assuming that there
exists a better solution ψ̂ than ψ, we will show that Rψ(sb)
will be marked at the end of the last iteration of ORA. This
leads to a contradiction and thus ψ̂ cannot exist. We begin our
proof with the following fact.
Fact 1: For the bottleneck source node sb under ψ, its relay
node Rψ(sb) is not marked at the end of the last iteration of
the ORA algorithm.
Proof: In the ORA algorithm, a relay node rj is marked
only if rj 6= Rψ(sb) (see Check Relay Availability() in
Fig. 5). Thus, Rψ(sb) cannot be marked at the end of the
last iteration of the ORA algorithm.
Fact 1 will be the basis for contradiction in our proof for
Theorem 1, the main result of this section.
Now we present the following three claims, which recur-
sively examine relay node assignment under ψ̂. First, for the
relay node assigned to sb in ψ̂, i.e., Rψ̂(sb), we have the
following claim.
Claim 1: Relay node Rψ̂(sb) must be marked at the end of
the last iteration of the ORA algorithm. Further, it cannot be
(marked)
^
^
^
^
n
G (s )
n
s
(unmarked)
(marked)
(marked)
(marked)
b b
b
b
b
b
b
k
G (s )
k
b
b
^
R ( G (s ) )
R (s )
G (s )
R (s )
^
^
^
R ( G (s ) )
R ( G (s ) )
Fig. 6. The sequence of nodes under analysis in the proof of optimality.
∅ and must be assigned to some source node under solution
ψ.
Proof: Since ψ̂ is a better solution than ψ, we have
CR(sb, Rψ̂(sb)) ≥ Ĉmin Cmin. Thus, by construction, ORA
will consider the relay node Rψ̂(sb)’s availability for sb in
its last iteration. Since ORA algorithm cannot find a better
solution in its last iteration, relay Rψ̂(sb) should be marked
and then the outcome for checking Rψ̂(sb)’s availability must
be unavailable. By “linear marking”, the mark on Rψ̂(sb)
will not be cleared throughout the search process in the last
iteration. Thus, the relay node Rψ̂(sb) is marked at the end
of the last iteration of ORA algorithm.
We now prove the second statement by contradiction. If
Rψ̂(sb) is ∅, then sb will choose ∅ in the last iteration since
it can offer CR(sb, Rψ̂(sb)) Cmin. But this contradicts to
the fact that we are now in the last iteration of ORA, which
is a non-improving iteration. So Rψ̂(sb) cannot be ∅. Further,
since we proved that Rψ̂(sb) is marked at the end of the last
iteration of the ORA algorithm, it must be assigned to some
source node already.
By the definition of Sψ(·), we have that Rψ̂(sb) is assigned
to source node Sψ(Rψ̂(sb)) in solution ψ. To simplify nota-
tion, define function Gψ(·) as
Gψ(·) = Sψ(Rψ̂(·)) . (10)
Thus, relay node Rψ̂(sb) is assigned to source node Gψ(sb)
in ψ (see top portion of Fig. 6).
Since Rψ̂(sb) 6= Rψ(sb), they are assigned to different
source nodes in ψ, i.e., Gψ(sb) 6= sb. Now, we recursively
investigate the relay node assigned to source Gψ(sb) under
solution ψ̂, i.e., Rψ̂(Gψ(sb)). We have the following claim
(also see Fig. 6).
Claim 2: Relay node Rψ̂(Gψ(sb)) must be marked at the
end of the last iteration of the ORA algorithm. Further, it
cannot be ∅ and must be assigned to some source node under
solution ψ.
The proofs for both statements in this claim follow the same
token as that for Claim 1.
10. 9
Again, by the definition of Sψ(·), we have that relay node
Rψ̂(Gψ(sb)) is assigned to source node Sψ(Rψ̂(Gψ(sb))) in
solution ψ. By (10), we have source Sψ(Rψ̂(Gψ(sb))) =
Gψ(Gψ(sb)). To simplify the notation, we define function
G2
ψ(·) as
G2
ψ(·) = Gψ(Gψ(·)) .
Thus, relay node Rψ̂(Gψ(sb)) is assigned to source node
G2
ψ(sb) in ψ. Now we have two cases: source node G2
ψ(sb) may
or may not be a node in {sb, Gψ(sb)}. If source node G2
ψ(sb)
is a node in {sb, Gψ(sb)}, then we terminate our recursive
procedure. Otherwise, we can further consider its relay node
in ψ̂.
In general we can use the following notation.
G0
ψ(sb) = sb,
Gk
ψ(sb) = Gψ(Gk−1
ψ (sb)) (k ≥ 1). (11)
Since the numbers of source nodes are finite, our recursive
procedure will terminate in finite steps. Suppose that we
terminate at k = n.
Following the same token for Claims 1 and 2, we can
obtain a similar claim for each of the relay nodes Rψ̂(G2
ψ(sb)),
Rψ̂(G3
ψ(sb)), · · · , Rψ̂(Gk
ψ(sb)), · · · , Rψ̂(Gn
ψ(sb)) (see Fig. 6).
Thus, we can generalize the statements in Claims 1 and 2 for
relay node Rψ̂(Gk
ψ(sb)) and have the following claim.
Claim 3: Relay node Rψ̂(Gk
ψ(sb)) must be marked at the
end of the last iteration of the ORA algorithm. Further, it
cannot be ∅ and must be assigned to some source node under
solution ψ, k = 0, 1, 2, · · ·, n.
Proof: Since ψ̂ is a better solution than ψ, we can say that
CR(Gk
ψ(sb), Rψ̂(Gk
ψ(sb))) ≥ Ĉmin Cmin. Note that Gk
ψ(sb) is
some source node in the solution ψ obtained by ORA, whereas
Rψ̂(Gk
ψ(sb)) is the relay node assigned to this source node in
the hypothesized better solution ψ̂. Our goal is to show that
ORA should have marked this relay node in its last iteration.
Since CR(Gk
ψ(sb), Rψ̂(Gk
ψ(sb))) Cmin and Rψ̂(Gk
ψ(sb)) is
not assigned to Gk
ψ(sb) in the last iteration of ORA, then by
construction of ORA, ORA must have checked Rψ̂(Gk
ψ(sb))’s
availability for Gk
ψ(sb) during the last iteration, then marked it,
and then determined it to be unavailable for Gk
ψ(sb). Moreover,
due to “linear marking”, this mark on Rψ̂(Gk
ψ(sb)) should be
there after the last iteration of ORA. Thus, we can conclude
that Rψ̂(Gk
ψ(sb)) is marked at the end of the last iteration of
the ORA algorithm.
We now prove the second statement by contradiction. If
Rψ̂(Gk
ψ(sb)) is ∅, then Gk
ψ(sb) will choose ∅ in the last iteration
since it can offer CR(Gk
ψ(sb), Rψ̂(Gk
ψ(sb)) Cmin, and finally
sb will be able to get a better relay node. But this contradicts
with the fact that this last iteration is a non-improving iteration.
So, Rψ̂(Gk
ψ(sb)) cannot be ∅. Further, since we proved that
Rψ̂(Gk
ψ(sb)) is marked at the end of the last iteration of the
ORA algorithm, it must be assigned to some source node
already.
Referring to Fig. 6, we have Claim 3 for a set of relay nodes
Rψ̂(sb), Rψ̂(Gψ(sb)), · · ·, Rψ̂(Gn
ψ(sb)). Our recursive proce-
dure terminates at Rψ̂(Gn
ψ(sb)) because its assigned source
node in solution ψ is a node in {sb, Gψ(sb), · · · , Gn
ψ(sb)}. We
are now ready to prove the following theorem, which is the
main result of this section.
Theorem 1: Upon the termination of the ORA algorithm,
the obtained solution ψ is optimal.
Proof: Under Claim 3, we proved that the relay node
Rψ̂(Gn
ψ(sb)) is assigned to some source node in solution ψ
obtained by ORA. Since our recursive procedure terminates
at Rψ̂(Gn
ψ(sb)), its assigned source node in solution ψ is
a node in {sb, Gψ(sb), · · · , Gn
ψ(sb)}. But we also know that
under ψ, source nodes Gψ(sb), G2
ψ(sb), G3
ψ(sb), · · ·, Gn
ψ(sb)
have relay nodes Rψ̂(sb), Rψ̂(Gψ(sb)), Rψ̂(G2
ψ(sb)), · · ·,
Rψ̂(Gn−1
ψ (sb)), respectively. Thus, Rψ̂(Gn
ψ(sb)) is the only
relay node that can be assigned to sb in solution ψ. On the
other hand, relay node assigned to sb in solution ψ is denoted
by Rψ(sb). Thus, we have Rψ̂(Gn
ψ(sb)) = Rψ(sb).
Now, Claim 3 states that Rψ̂(Gn
ψ(sb)) must be marked after
the last iteration, whereas Fact 1 states that the relay node
assigned to the bottleneck source node, i.e., Rψ(sb), cannot
be marked. Since both Rψ(sb) and Rψ̂(Gn
ψ(sb)) are the same
relay node, we have a contradiction. Thus our assumption that
there exists a solution ψ̂ better than ψ does not hold. The proof
is complete.
Note that the proof of Theorem 1 does not depend on the
initial assignment in ORA. So we have the following important
property.
Corollary 1.1: Under any feasible initial relay node assign-
ment, the ORA algorithm can find an optimal relay node
assignment.
VII. NUMERICAL RESULTS
In this section, we present some numerical results to demon-
strate the properties of the ORA algorithm.
A. Simulation Setting
We consider a 100-node cooperative ad hoc network. The
location of each node is given in Table III. For this network, we
consider both the cases of Nr ≥ Ns and Nr Ns. In the first
case, we have 30 source-destination pairs and 40 relay nodes.
While in the second case, we have 40 source-destination pairs
and only 20 relay nodes. The role of each node (either as a
source, destination, or relay) for each case is shown in Figs. 7
and 9, respectively, with details given in Table III.
For the simulations, we assume W = 10 MHz bandwidth
for each channel. The maximum transmission power at each
node is set to 1 W. Each relay node employs AF for cooper-
ative communications. We assume that hsd only includes the
path loss component between nodes s and d and is given by
|hsd|2
= ||s−d||−4
, where ||s−d|| is the distance (in meters)
between these two nodes and 4 is the path loss index. Note
that the working of the ORA algorithm does not depend on the
mode of CC and the channel gain model. As long as channel
gains and achievable rates are known, ORA will give optimal
assignment. For the AWGN channel, we assume the variance
of noise is 10−10
W at all nodes.
11. 10
TABLE III
LOCATIONS AND ROLES OF ALL THE NODES IN THE NETWORK.
Node Role Node Role Node Role
Location Case 1 Case 2 Location Case 1 Case 2 Location Case 1 Case 2
(75, 500) s1 s1 (220, 190) d4 d4 (380, 370) r7 s31
(170, 430) s2 s2 (660, 190) d5 d5 (300, 350) r8 r8
(170, 500) s3 s3 (430, 630) d6 d6 (410, 650) r9 s33
(250, 650) s4 s4 (180, 620) d7 d7 (470, 500) r10 d40
(400, 550) s5 s5 (750, 625) d8 d8 (660, 525) r11 s39
(340, 230) s6 s6 (310, 480) d9 d9 (600, 425) r12 s40
(390, 150) s7 s7 (1100, 180) d10 d10 (510, 200) r13 s38
(460, 280) s8 s8 (1110, 360) d11 d11 (575, 325) r14 r14
(700, 500) s9 s9 (875, 600) d12 d12 (750, 560) r15 r15
(750, 360) s10 s10 (700, 300) d13 d13 (800, 360) r16 r16
(800, 90) s11 s11 (650, 550) d14 d14 (860, 260) r17 r17
(900, 160) s12 s12 (740, 170) d15 d15 (980, 450) r18 r18
(1125, 300) s13 s13 (410, 810) d16 d16 (950, 310) r19 r19
(1000, 340) s14 s14 (550, 1100) d17 d17 (950, 200) r20 d37
(1025, 540) s15 s15 (150, 790) d18 d18 (100, 1000) r21 s32
(100, 1120) s16 s16 (210, 1110) d19 d19 (310, 980) r22 r12
(150, 920) s17 s17 (530, 720) d20 d20 (250, 800) r23 d32
(330, 1110) s18 s18 (800, 1140) d21 d21 (460, 1010) r24 r13
(450, 890) s19 s19 (1080, 1100) d22 d22 (610, 930) r25 d34
(650, 1050) s20 s20 (940, 790) d23 d23 (680, 760) r26 s34
(700, 640) s21 s21 (1360, 640) d24 d24 (700, 900) r27 r20
(820, 880) s22 s22 (1280, 1120) d25 d25 (910, 1120) r28 d35
(1150, 1060) s23 s23 (1260, 350) d26 d26 (970, 970) r29 s35
(1480, 1120) s24 s24 (1500, 50) d27 d27 (1360, 910) r30 r9
(1160, 720) s25 s25 (1450, 605) d28 d28 (1200, 920) r31 r11
(1050, 50) s26 s26 (1030, 910) d29 d29 (1250, 690) r32 d36
(1350, 450) s27 s27 (1150, 230) d30 d30 (1290, 180) r33 r10
(1380, 110) s28 s28 (80, 370) r1 d31 (150, 360) r34 r5
(1500, 800) s29 s29 (110, 280) r2 r2 (1380, 380) r35 r7
(1500, 300) s30 s30 (160, 300) r3 r3 (1220, 60) r36 s37
(200, 50) d1 d1 (280, 520) r4 r4 (1190, 510) r37 s36
(520, 240) d2 d2 (375, 580) r5 d39 (500, 40) r38 d38
(40, 100) d3 d3 (385, 450) r6 r6 (50, 805) r39 d33
(1510, 920) r40 r1
4 0 0
s 1
s 3
s 2
s 4
s 5
s 6
s 7
s 8
s 9
s 1 5
s 1 4
s 1 0
s 1 1
s 1 2
s 1 3
d 3
d 1
d 7
d 9
d 2
d 1 3
d 1 5 d 1 0
d 4
d 6
d 1 4
d 8
d 1 2
d 1 1
d 5
r3
r1
r4
r8
r7
r6
r5
r9
r 1 0 r 1 1
r 1 2
r 1 3
r 1 4
r 1 5
r 1 6
r 1 8
r 1 7 r 1 9
r 2 0
r2
0
8 0 0
S e n d e r s R e c e i v e r s P o t e n t i a l R e l a y s
1 0 0 2 0 0 3 0 0 5 0 0 6 0 0 7 0 0 8 0 0 9 0 0 1 0 0 0 1 1 0 0 1 2 0 0
1 0 0
2 0 0
3 0 0
4 0 0
5 0 0
6 0 0
7 0 0
( m e t e r s )
( m e t e r s )
0
1 3 0 0 1 4 0 0 1 5 0 0 1 6 0 0
9 0 0
1 0 0 0
1 1 0 0
1 2 0 0
s 1 6
s 1 7
s 1 8
s 1 9
s 2 0
s 2 1
s 2 2
s 2 3
s 2 4
s 2 5
s 2 6
s 2 7
s 2 8
s 2 9
s 3 0
d 1 6
d 1 7
d 1 8
d 1 9
d 2 0
d 2 1
d 2 2
d 2 3
d 2 4
d 2 5
d 2 6
d 2 7
d 2 8
d 2 9
d 3 0
r 2 1
r 2 2
r 2 3
r 2 4
r 2 5
r 2 6
r 2 7
r 2 8
r 2 9
r 3 0
r 3 1
r 3 2
r 3 3
r 3 4
r 3 5
r 3 6
r 3 7
r 3 8
r 3 9
r 4 0
Fig. 7. Topology for a 100-node network for Case 1 (Nr ≥ Ns), with
Ns = 30 and Nr = 40.
B. Results
Case 1: Nr ≥ Ns. In this case (see Fig. 7), we have 30
source-destination pairs and 40 relay nodes.
Under ORA, after preprocessing, we start with an initial
relay node assignment in the first iteration. Such initial as-
signment is not unique. But regardless of the initial relay
node assignment, we expect the objective value to converge
to the optimum (by Corollary 1.1). To validate this result, in
Table IV, we show the results of running the ORA algorithm
under two different initial relay node assignments, denoted as
!#$%'()*+,-#$)
.
,/(
)01-234)
52,%6)).,/()
.,/()+(7#$)8/$#9):$%(3,/33/'()
!(/%6);#6%)=33/(,#()?)
!(/%6);#6%)=33/(,#()@)
Fig. 8. Case 1 (Nr ≥ Ns): The objective value Cmin at each iteration of
ORA algorithm under two different initial relay node assignments.
I and II (see Table IV).
In Table IV, the second column shows the data rate for
each source-destination pair under direct transmissions. Note
that the minimum rate among all pairs is 1.83 Mbps, which
is associated with s7. The third to fifth columns are results
under initial relay node assignment I and sixth to eighth
columns are results under initial relay node assignment II.
The symbol ∅ denotes direct transmissions. Note that initial
relay node assignments I and II are different. As a result, the
final assignment is different under I and II. However, the final
12. 11
TABLE IV
OPTIMAL ASSIGNMENTS FOR CASE 1 (Nr ≥ Ns) UNDER TWO DIFFERENT
INITIAL RELAY NODE ASSIGNMENTS.
Relay Assignment I Relay Assignment II
Ses- CD Final Final
sion (Mbps) Initial Final Rate Initial Final Rate
(Mbps) (Mbps)
s1 2.62 ∅ r3 6.54 r3 r3 6.54
s2 4.60 r8 r7 9.46 r8 r7 9.46
s3 3.81 ∅ r2 8.73 r1 r1 7.21
s4 2.75 ∅ r4 4.66 r4 r4 4.66
s5 3.15 ∅ r14 6.47 r7 r14 6.47
s6 4.17 ∅ r6 9.25 r10 r6 9.25
s7 1.83 r6 r8 4.76 r6 r8 4.76
s8 2.99 ∅ r12 7.22 r16 r12 7.22
s9 4.92 r12 r10 9.81 r12 r10 9.81
s10 4.80 r18 ∅ 4.80 ∅ ∅ 4.80
s11 4.13 r16 r20 9.13 r17 r20 9.13
s12 3.23 ∅ r19 5.89 r18 r18 5.55
s13 3.68 ∅ r18 4.84 r19 r17 7.32
s14 4.23 ∅ r16 7.87 r15 r15 5.29
s15 2.62 r17 r17 4.86 r20 r19 5.84
s16 3.30 ∅ r22 7.29 r22 r22 7.29
s17 4.17 ∅ r24 5.62 r24 r24 5.62
s18 6.03 r21 r21 7.37 r23 r23 6.26
s19 8.76 ∅ ∅ 8.76 ∅ ∅ 8.76
s20 6.95 ∅ ∅ 6.95 ∅ ∅ 6.95
s21 1.90 r27 r27 4.90 r27 r27 4.90
s22 7.65 r28 r28 8.71 r28 r28 8.71
s23 7.55 r29 r29 11.26 r29 r28 11.26
s24 2.12 r40 r40 4.43 ∅ r40 4.43
s25 3.90 ∅ r30 5.87 ∅ r30 5.87
s26 6.08 r36 r36 6.81 r36 r36 6.81
s27 3.61 ∅ r34 5.44 ∅ r34 5.44
s28 2.04 r35 r35 5.29 ∅ r35 5.29
s29 2.32 r30 r31 4.68 ∅ r31 4.68
s30 6.60 r34 r33 9.65 r34 r33 9.65
4 0 0
s 1 s 3
s 2
s 4
s 5
s 6
s 7
s 8
s 9
s 1 5
s 1 4
s 1 0
s 1 1
s 1 2
s 1 3
d 3
d 1
d 7
d 9
d 2
d 1 3
d 1 5
d 1 0
d 4
d 6
d 1 4
d 8
d 1 2
d 1 1
d 5
r3
d 3 1
r4
r8
s 3 1
r6
d 3 9
s 3 3
d 4 0
s 3 9
s 4 0
s 3 8
r 1 4
r 1 5
r 1 6
r 1 8
r 1 7 r 1 9
d 3 7
r2
0
S e n d e r s R e c e i v e r s P o t e n t i a l R e l a y s
1 0 0 2 0 0 3 0 0 5 0 0 6 0 0 7 0 0 8 0 0 9 0 0 1 0 0 0 1 1 0 0 1 2 0 0
( m e t e r s )
( m e t e r s )
0
1 3 0 0 1 4 0 0 1 5 0 0 1 6 0 0
1 1 0 0
1 2 0 0
s 1 6
s 1 7
s 1 8
s 1 9
s 2 0
s 2 1
s 2 2
s 2 3
s 2 4
s 2 5
s 2 6
s 2 7
s 2 8
s 2 9
s 3 0
d 1 6
d 1 7
d 1 8
d 1 9
d 2 0
d 2 1
d 2 2
d 2 3
d 2 4
d 2 5
d 2 6
d 2 7
d 2 8
d 2 9
d 3 0
s 3 2
r 1 2
d 3 2
r 1 3
d 3 4
s 3 4
r 2 0
d 3 5
s 3 5
r9
r 1 1
d 3 6
r 1 0
r5
r7
s 3 7
s 3 6
d 3 8
d 3 3
r1
8 0 0
1 0 0
2 0 0
3 0 0
4 0 0
5 0 0
6 0 0
7 0 0
9 0 0
1 0 0 0
Fig. 9. Topology for a 100-node network for Case 2 (Nr Ns), with
Ns = 40 and Nr = 20.
objective value (i.e., Cmin) under I and II is identical (4.43
Mbps).
Figure 8 shows the objective value Cmin at each iteration
under initial relay node assignments I and II. Under either
initial relay node assignments I or II, Cmin is a non-decreasing
function of iteration number. Note that a higher initial value
of Cmin does not mean that ORA will converge faster. The
increase of Cmin by cooperative communications over direct
transmissions is significant (from 1.83 Mbps to 4.43 Mbps).
Case 2: Nr Ns. In this case (see Fig. 9), we have 40
TABLE V
OPTIMAL ASSIGNMENTS FOR CASE 2 (Nr Ns) UNDER TWO DIFFERENT
INITIAL RELAY NODE ASSIGNMENTS.
Relay Assignment I Relay Assignment II
Ses- CD Final Final
sion (Mbps) Initial Final Rate Initial Final Rate
(Mbps) (Mbps)
s1 2.62 ∅ r2 6.62 r3 r3 6.54
s2 2.60 ∅ ∅ 4.60 ∅ ∅ 4.60
s3 3.81 ∅ ∅ 3.81 ∅ ∅ 3.81
s4 2.75 ∅ r5 4.66 r8 r5 5.20
s5 3.15 ∅ r6 3.80 r14 r6 3.80
s6 4.17 ∅ ∅ 4.17 ∅ ∅ 4.16
s7 1.83 ∅ r8 4.76 r6 r8 4.76
s8 2.99 ∅ r14 4.43 ∅ r14 4.43
s9 4.92 ∅ ∅ 4.92 ∅ ∅ 4.92
s10 4.80 ∅ ∅ 4.80 ∅ ∅ 4.80
s11 4.13 ∅ ∅ 4.13 ∅ ∅ 4.13
s12 3.23 ∅ r18 5.55 ∅ r18 5.55
s13 3.68 ∅ r19 8.04 ∅ r19 8.04
s14 4.23 ∅ ∅ 4.23 ∅ ∅ 4.23
s15 2.62 ∅ r16 5.60 ∅ r16 5.60
s16 3.30 ∅ r12 7.30 ∅ r12 7.30
s17 4.17 ∅ ∅ 4.17 ∅ ∅ 4.17
s18 6.03 ∅ ∅ 6.03 r13 ∅ 6.03
s19 8.76 ∅ ∅ 8.76 r12 r13 8.97
s20 6.95 ∅ ∅ 6.95 r20 ∅ 6.95
s21 1.90 ∅ r20 4.90 ∅ r20 4.90
s22 7.65 ∅ ∅ 7.65 ∅ ∅ 7.65
s23 7.55 ∅ ∅ 7.55 r11 ∅ 7.55
s24 2.12 ∅ r9 5.15 ∅ r9 5.15
s25 3.91 ∅ ∅ 3.91 ∅ ∅ 3.91
s26 6.08 ∅ ∅ 6.08 r10 ∅ 6.08
s27 3.61 ∅ r10 5.27 ∅ r10 5.27
s28 2.04 ∅ r7 5.29 ∅ r7 5.29
s29 2.32 ∅ r11 4.68 ∅ r11 4.68
s30 6.60 ∅ ∅ 6.60 ∅ ∅ 6.60
s31 11.06 ∅ ∅ 11.06 ∅ ∅ 11.06
s32 17.47 ∅ ∅ 17.47 ∅ ∅ 17.47
s33 4.86 ∅ ∅ 4.86 ∅ ∅ 4.86
s34 31.34 ∅ ∅ 31.34 ∅ ∅ 31.34
s35 37.87 ∅ ∅ 37.87 ∅ ∅ 37.87
s36 29.79 ∅ ∅ 29.79 ∅ ∅ 29.79
s37 10.65 ∅ ∅ 10.65 ∅ ∅ 10.65
s38 38.27 ∅ ∅ 38.27 ∅ ∅ 38.27
s39 12.10 ∅ ∅ 12.10 ∅ ∅ 12.10
s40 41.70 ∅ ∅ 41.70 ∅ ∅ 41.70
!#$%'()*+,-#$)
.)
,/(
)01-234)
52,%6).,/()
.,/()+(7#$)8/$#9):$%(3,/33/'()
!(/%6);#6%)=33/(,#()?)
!(/%6);#6%)=33/(,#()@)
Fig. 10. Case 2 (Nr Ns): The objective value Cmin at each iteration of
ORA algorithm under two different initial node assignments.
source-destination pairs and 20 relay nodes.
Table V shows the results of this case under two different
initial relay node assignments I and II. The second column
13. 12
TABLE VI
AN EXAMPLE ILLUSTRATING THE IMPORTANCE OF PREPROCESSING.
Without Preprocessing
Sender CD Final
(Mbps) Initial Final Rate
(Mbps)
s1 2.62 r3 r3 6.54
s2 4.60 ∅ ∅ 4.60
s3 3.81 ∅ r2 8.73
s4 2.75 r8 r4 4.66
s5 3.15 r14 r14 6.47
s6 4.17 ∅ r6 9.25
s7 1.83 r6 r8 4.76
s8 2.99 ∅ r12 7.22
s9 4.92 ∅ ∅ 4.92
s10 4.80 ∅ ∅ 4.80
s11 4.13 ∅ r20 9.13
s12 3.24 ∅ r18 5.55
s13 3.68 ∅ r17 7.32
s14 4.23 ∅ r16 7.87
s15 2.62 ∅ r19 5.84
s16 3.30 ∅ r22 7.30
s17 4.17 ∅ r24 5.62
s18 6.03 r23 r21 7.37
s19 8.76 r39 r39 4.81
s20 6.95 r26 r26 7.25
s21 1.90 ∅ r27 4.90
s22 7.65 r28 r28 8.71
s23 7.55 r29 r29 11.26
s24 2.12 ∅ r40 4.43
s25 3.91 ∅ r30 5.87
s26 6.08 r33 r33 7.55
s27 3.61 ∅ r34 5.45
s28 2.04 ∅ r35 5.29
s29 2.33 ∅ r31 4.68
s30 6.60 ∅ ∅ 6.60
in Table V lists the data rate under direct transmissions. As
discussed at the end of Section V-B, for the case of Nr
Ns, it is only necessary to consider relay node assignment
for Nr = 20 source nodes corresponding to the 20 smallest
achievable rates under direct transmission.
Again in Table V, the objective value Cmin is identical (3.80
Mbps) regardless of different initial relay node assignments
(I and II). Note that despite the difference in final relay
node assignments under I and II, the objective value Cmin is
identical. The increase of Cmin by cooperative communications
over direct transmissions is significant (from 1.83 Mbps to
3.80 Mbps).
Figure 10 shows the objective value Cmin at each iteration
under initial relay node assignments I and II. Again, we
observe that in Fig. 10, Cmin is a non-decreasing function of
iteration number under both initial relay node assignments I
and II.
Significance of Preprocessing: Now we use a set of
numerical results to show the significance of preprocessing
in our ORA algorithm. We consider the same network in
Fig. 7 with 30 source-destination pairs and 40 relay nodes.
Now we remove the preprocessing step in the ORA algorithm.
As an example, the third column of Table VI shows an initial
assignment without first going through the preprocessing step.
Although the objective value Cmin also reaches the same
optimal value (4.43 Mbps) as that in Table IV, the final data
rate for some non-bottleneck source nodes could be worse
than direct transmissions. For example, for s19, its final rate is
4.81 Mbps, which is less than its direct transmission rate (8.76
Mbps). Such event is undetectable without the preprocessing
step, as 4.81 Mbps is still greater than the optimal objective
value (4.43 Mbps).
On the other hand, when the preprocessing step is employed,
ORA can ensure that the final rate for each source-destination
pair is no less than that under direct transmission, as shown
in Table IV.
VIII. A SKETCH OF A POSSIBLE IMPLEMENTATION
In this section, we present a sketch of a possible implemen-
tation of the ORA algorithm. This implementation follows the
link-state approach. Note that although a link-state approach
is not considered fully distributed, it is nevertheless a viable
implementation, as evidenced by the widespread deployment
of OSPF [12] in the Internet and acceptance of OLSR [3] in
wireless ad hoc networks.
A. Ensuring Identical Optimal Solution at Source Nodes
In the presentation of the ORA algorithm in Section V, we
have learned that the ORA algorithm can start with any random
initial relay node assignment and can still obtain an optimal
solution. However, in the link-state based implementation,
each source node in the network will run ORA independently
on its own. As such, the randomness in initial relay assignment
must be removed in implementation so as to ensure that
each source node can obtain an identical optimal solution.
Otherwise, we may run into a situation that the same relay
node may be assigned to multiple source nodes.
A simple way to ensure identical initial relay node assign-
ment is to have each source node choose direct transmission,
i.e. ∅ as its initial relay assignment. Given such identical initial
assignment and that ORA is a deterministic algorithm, each
source node will obtain an identical final optimal solution.
B. Some Implementation Details
Under such implementation, each relay node collects its
link state information with its neighboring source nodes; each
destination node also collects its link state information with
its source node and neighboring relay nodes. To do this,
each source node sends a broadcast packet to its neighboring
relay nodes and its destination node; each relay node sends
a broadcast packet to its neighboring destination nodes. As
shown in [6] by Gollakota and Katabi, this broadcast packet
transmission can be used by the receiver of each wireless
link to accurately determine the link state. It was also shown
in [6] that such an approach is practically feasible, and was
demonstrated in their implementation of 802.11 receivers.
However, we point out that in an uncontrolled environment,
estimating channel state is not trivial.
Upon obtaining the link-state information, each relay and
destination node will distribute such information to all the
source nodes in the network. This will ensure that each source
node will have global link-state information. Such link-state
dissemination can be achieved by using one of the many effi-
cient flooding techniques (see e.g. [23]) for wireless networks.
14. 13
The overhead of this operation is small when compared to
potential gain in achievable rate in optimal assignment (see
Section VIII-C).
Once each source node has global link-state information, it
can now run ORA locally, with an identical initial assignment
as discussed in Section VIII-A. As discussed, the final optimal
solution obtained at each source node will be identical.
C. Overhead
An important consideration in our implementation is the
overhead incurred in distributing link-state information in the
network. This can be measured by comparing such overhead
with the potential gain in achievable rate in the optimal
solution. We now analyze such overhead and show that the
ratio between the two is small, thus affirming the efficacy of
our proposed implementation.
First of all, Mandke et al. [11] conducted extensive exper-
iments and showed that the CSI for the 10 MHz band in 2.4
GHz spectrum changes every 300 mSec on average. Their
experiments showed that CSI distribution does not need to
be performed more frequently than every 300 mSec (or 0.3
Sec).
To run the ORA algorithm locally, each source node must
obtain global link-state information. This can be done by
having all relay nodes and destination nodes flood their local
link-state information in the network. To estimate an upper
bound for such flooding overhead, we assume that 32 bits
(commonly used for floating variables) are used to represent
each link-state value. Then the total link-state information
collected at each relay node has Or = Ns ×32 bits. Similarly,
the total link-state information collected at each destination
node has Od = (Nr + 1) × 32 bits. As a result, the total
overhead (in b/s) due to flooding at every node is:
O =
Nr · Or + Nd · Od
0.3
. (12)
As an example, for Case 1 in the numerical results in Sec-
tion VII-B, it can be shown that the total overhead is 170.83
Kb/s at each node. On the other hand, the gain in the bottleneck
data rate by ORA is 4.43−1.83 = 2.6 Mb/s. The ratio between
the two is only 6.4%. That is, the overhead is much less than
the gain of CC.
We acknowledge that in some environments, the overhead
could be large if CSI in the network varies on a smaller time
scale. Under such environment, fast and efficient dissemination
of CSI remains an open problem.
IX. CONCLUSION
Cooperative communications is a powerful communication
paradigm to achieve spatial diversity. However, the perfor-
mance of such communication paradigm hinges upon the
assignment of relay nodes in the network. In this paper,
we studied this problem in a cooperative ad hoc network
environment, where multiple source-destination pairs compete
for the same pool of relay nodes. Our objective is to assign the
available relay nodes to different source-destination pairs so as
to maximize the minimum data rate among all the pairs. The
main contribution of this paper is a polynomial time optimal
algorithm that achieves this objective. A novel idea in this
algorithm is a “linear marking” mechanism, which is able to
achieve linear complexity at each iteration. We gave a formal
proof of optimality for the algorithm and used numerical
results to demonstrate its efficacy.
Although we offered a sketch of a possible implementation
of ORA, a number of issues remain challenging in practice.
In particular, fast and efficient method for collecting and
disseminating CSI in moderate and large sized networks
remain an open problem. Nevertheless, the theoretical results
presented here can be used as a performance benchmark for
other proposed solutions in practice.
ACKNOWLEDGMENTS
The authors thank Editor Suhas Diggavi, who handled the
review of this paper. The authors also thank the anonymous re-
viewers who offered very constructive comments on improving
the presentation of this paper. Y.T. Hou, S. Sharma, and Y. Shi
were supported in part by National Science Foundation under
Grant CCF-0946273 and Naval Research Laboratory under
Grant N00173-10-1-G-007. S. Kompella has been supported
in part by the Office of Naval Research.
REFERENCES
[1] A. Bletsas, A. Khisti, D. Reed, and A. Lippman, “A simple cooperative
diversity method based on network path selection,” IEEE Journal
on Selected Areas in Communications, vol. 24, no. 3, pp. 659–672,
March 2006.
[2] J. Cai, S. Shen, J.W. Mark, and A.S. Alfa, “Semi-distributed user
relaying algorithm for amplify-and-forward wireless relay networks,”
IEEE Transactions on Wireless Communication, vol. 7, no. 4, pp. 1348–
1357, April 2008.
[3] T. Clause and P. Jacquet, “Optimized link state routing protocol,” IETF
RFC 3626, October 2003.
[4] T.M. Cover and A. EL Gamal, “Capacity theorems for the relay
channel,” IEEE Transactions on Information Theory, vol. 25, issue 5,
pp. 572–584, 1979.
[5] M.O. Damen and A.R. Hammons, “Delay-tolerant distributed-TAST
codes for cooperative diversity,” IEEE Transactions on Information
Theory, vol. 53, no. 10, pp. 3755–3773, Oct. 2007.
[6] S. Gollakota and D. Katabi, “Zigzag decoding: combating hidden
terminals in wireless networks,” In Proceedings of ACM SIGCOMM,
pp. 159–170, Seattle, WA, August 17–22, 2008.
[7] D. Gunduz and E. Erkip, “Opportunistic cooperation by dynamic
resource allocation,” IEEE Transactions on Wireless Communications,
vol. 6, no. 4, pp. 1446–1454, April 2007.
[8] O. Gurewitz, A. de Baynast, and E.W. Knightly, “Cooperative strategies
and achievable rate for tree networks with optimal spatial reuse,” IEEE
Transactions on Information Theory, vol. 53, no. 10, pp. 3596–3614,
Oct. 2007.
[9] A.E. Khandani, J. Abounadi, E. Modiano, and L. Zheng, “Cooperative
routing in static wireless networks,” IEEE Transactions on Communica-
tions, vol. 55, no. 11, pp. 2185–2192, Nov. 2007.
[10] J.N. Laneman, D.N.C. Tse, and G.W. Wornell, “Cooperative diversity
in wireless networks: Efficient protocols and outage behavior,” IEEE
Transactions on Information Theory, vol. 50, no. 12, pp. 3062–3080,
Dec. 2004.
[11] K. Mandke, R.C. Daniels, S. Choi, S.M. Nettles, and R.W. Heath Jr.,
“Physical concerns for cross-layer prototyping and wireless network
experimentation,” In Proc. ACM Int’l Workshop on Wireless Network
Testbeds, Experimental Evaluation and Characterization (in conjunction
with ACM MobiCom 2007), pp. 11–18, Montreal, Quebec, Canada,
Sept. 10, 2007.
[12] J. Moy, “Open shortest path first version 2,” IETF RFC 2328, April
1998.
15. 14
[13] T. C-Y. Ng and W. Yu, “Joint optimization of relay strategies and
resource allocations in cooperative cellular networks,” IEEE Journal
on Selected Areas in Communications, vol. 25, no. 2, pp. 328–339,
Feb. 2007.
[14] S. Savazzi, and U. Spagnolini, “Energy aware power allocation strategies
for multihop-cooperative transmission schemes,” IEEE Journal on Se-
lected Areas in Communications, vol. 25, no. 2, pp. 318–327, February
2007.
[15] A. Scaglione, D.L. Goeckel, and J.N. Laneman, “Cooperative communi-
cations in mobile ad hoc networks,” IEEE Signal Processing Magazine,
vol. 23, no. 5, pp. 18–29, Sept. 2006.
[16] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity
– part I: System description,” IEEE Transactions on Communications,
vol. 51, no. 11, pp. 1927–1938, Nov. 2003.
[17] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity
– part II: implementation aspects and performance analysis,” IEEE
Transactions on Communications, vol. 51, no. 11, pp. 1939–1948,
Nov. 2003.
[18] L. Tassiulas and A. Ephremides. “Stability properties of constrained
queueing systems and scheduling policies for maximum throughput in
multihop radio networks,” IEEE Transactions on Automatic Control,
vol. 37, no. 12, pp. 1936–1948, 1992.
[19] E.C. van der Meulen and P. Vanroose. “The capacity of a relay channel,
both with and without delay,” IEEE Transactions on Information Theory,
vol. 53, no. 10, pp. 3774–3776, October 2007.
[20] E.C. van der Meulen, “Three terminal communication channels,” Ad-
vances in Applied Probability, vol. 3, pp. 120-154, 1971.
[21] B. Wang, Z. Han, and K.J.R. Liu, “Distributed relay selection and
power control for multiuser cooperative communication networks using
buyer/seller game,” In Proc. IEEE INFOCOM, pp. 544–552, Anchorage,
AL, May 6–12, 2007.
[22] E.M. Yeh and R.A. Berry, “Throughput optimal control of cooperative
relay networks,” IEEE Transactions on Information Theory, vol. 53,
no. 10, pp. 3827–3833, Oct. 2007.
[23] Y. Yi, M. Gerla, and T.J. Kwon, “Efficient flooding in ad hoc networks:
a comparative performance study,” IEEE International Conference on
Communications, vol. 2, pp. 1059-1063, May 11-15 2003.
[24] Y. Zhao, R.S. Adve, and T.J. Lim, “Improving amplify-and-forward relay
networks: optimal power allocation versus selection,” in Proc. IEEE In-
ternational Symposium on Information Theory, pp. 1234–1238, Seattle,
WA, July 9–14, 2006.
Sushant Sharma (S’06) received his B.E. degree in
computer engineering from the University of Pune,
India, in 2002, and the M.S. degree in computer
science from the University of New Mexico, Albu-
querque, in 2005. He is currently pursuing the Ph.D
degree in Computer Science at Virginia Polytech-
nic Institute and State University (“Virginia Tech”),
Blacksburg, VA. His research interests include devel-
oping algorithms to solve cross-layer optimization
problems in ad hoc wireless networks.
Yi Shi (S’02–M’08) received his B.S. degree from
the University of Science and Technology of China,
Hefei, China, in 1998, a M.S. degree from Institute
of Software, Chinese Academy of Science, Beijing,
China, in 2001, a second M.S. degree from Virginia
Polytechnic Institute and State University (“Virginia
Tech”), Blacksburg, VA, in 2003, all in computer
science, and a Ph.D. degree in computer engineering
from Virginia Tech, in 2007. He is currently a
Research Scientist in the Department of Electrical
and Computer Engineering at Virginia Tech. Dr.
Shi’s research focuses on algorithms and optimization for cognitive radio
networks, MIMO and cooperative communication networks, sensor networks,
and ad hoc networks. He was a recipient of IEEE INFOCOM 2008 Best Paper
Award. He was a recipient of Chinese Government Award for Outstanding
Ph.D. Students Abroad in 2006. While an undergraduate, he was a recipient
of Meritorious Award in International Mathematical Contest in Modeling
in 1997 and 1998, respectively. He served as a TPC member for many
major international conferences (including ACM MobiHoc 2009 and IEEE
INFOCOM 2009–2011).
Y. Thomas Hou (S’91–M’98–SM’04) received his
Ph.D. degree in Electrical Engineering from Poly-
technic Institute of New York University in 1998.
From 1997 to 2002, Dr. Hou was a Researcher at
Fujitsu Laboratories of America, Sunnyvale, CA.
Since 2002, he has been with Virginia Polytechnic
Institute and State University (“Virginia Tech”), the
Bradley Department of Electrical and Computer
Engineering, Blacksburg, VA, where he is now an
Associate Professor.
Prof. Hou’s research interests are cross-layer de-
sign and optimization for cognitive radio wireless networks, cooperative
communications, MIMO-based ad hoc networks, and new interference man-
agement schemes for wireless networks. He is a recipient of an Office of Naval
Research (ONR) Young Investigator Award (2003) and a National Science
Foundation (NSF) CAREER Award (2004) for his research on optimizations
and algorithm design for wireless ad hoc and sensor networks.
Prof. Hou is currently serving as an Area Editor of IEEE Transactions on
Wireless Communications, and Editor for IEEE Transactions on Mobile Com-
puting, IEEE Wireless Communications, ACM/Springer Wireless Networks
(WINET), and Elsevier Ad Hoc Networks. He was a past Associate Editor
of IEEE Transactions on Vehicular Technology. He was Technical Program
Co-Chair of IEEE INFOCOM 2009.
Prof. Hou recently co-edited a textbook titled Cognitive Radio Commu-
nications and Networks: Principles and Practices, which was published by
Academic Press/Elsevier, 2010.
Sastry Kompella (S’04–M’07) received the Ph.D.
degree in electrical and computer engineering from
Virginia Polytechnic Institute and State University,
Blacksburg, VA, in 2006. Currently, he is a Re-
searcher with the Information Technology Division,
U.S. Naval Research Laboratory, Washington, DC.
His research focuses on complex problems in cross-
layer optimization and scheduling in wireless net-
works.