SlideShare a Scribd company logo
Spectrum Leasing via Cooperative
Opportunistic Routing in Distributed Ad Hoc
Networks: Optimal and Heuristic Policies

Cristiano Tapparello
Davide Chiarotto, Michele Rossi, Osvaldo
Simeone and Michele Zorzi




                                           04/11/11
Outline

¨    Cognitive radio
¨    Spectrum leasing and opportunistic routing
¨    Optimal policies
¨    Heuristic policies
¨    Numerical Results
¨    Conclusions

Cristiano Tapparello – Asilomar 2011               04/11/11
Cognitive Radio
¨    Coexistence	
  of:	
  
      q  primary	
  network:	
  licensed	
  
      q  secondary	
  network:	
  unlicensed	
  

¨    Common	
  model:	
  
      q  primary	
  users	
  are	
  oblivious	
  to	
  the	
  presence	
  of	
  secondary	
  users	
  
      q  secondary	
   users	
   sense	
   the	
   radio	
   environment	
   in	
   search	
   of	
  
          spectrum	
  holes	
  
      q  Performance	
  limited	
  by	
  sensing	
  errors	
  

¨    Spectrum	
  leasing:	
  
      q    primary	
   users	
   lease	
   part	
   of	
   the	
   (licensed)	
   spectrum	
   to	
  
            secondary	
  users	
  in	
  exchange	
  for	
  appropriate	
  remunera?on	
  


Cristiano Tapparello – Asilomar 2011                                                          04/11/11
Spectrum leasing via
                                       cooperation [Simeone08]
¨  Remuneration is offered by the secondary users in the
    form of cooperation (relaying)
¨  Secondary users accept to cooperate if leased
    enough spectral resources to satisfy QoS requirements




Cristiano Tapparello – Asilomar 2011                      04/11/11
Opportunistic routing


      Po                                                   Pd




¨    Leverages broadcast nature of wireless channel
¨    Next hop selected in an adaptive manner, based on:
      q    current channel conditions (relay availability) [Larsson01]
      q    distance to destination [Zorzi03, Morris04]
      q    delay and congestion criteria [Javidi09]

Cristiano Tapparello – Asilomar 2011                                      04/11/11
Spectrum leasing via
                  opportunistic cooperative routing
                                                     = primary
                                                     = secondary
      Po                                    Pd




¨    Spectrum leasing with remuneration offered by secondary
      network via forwarding
¨    Secondary nodes act as potential next hops
¨    Secondary nodes accept to cooperate if QoS requirements are
      satisfied
Cristiano Tapparello – Asilomar 2011                       04/11/11
Optimization goal


      Po                                                Pd




¨    Find	
  op?mal	
  next-­‐hop	
  selec?on	
  policies:	
  
      ¤  Primary	
  end-­‐to-­‐end	
  throughput	
  
      ¤  Primary	
  energy	
  consump?on	
  
¨    Spectrum	
  leasing	
  subject	
  to	
  secondary	
  QoS	
  
      requirements	
  
Cristiano Tapparello – Asilomar 2011                                 04/11/11
System model
                                                    T = RP [ RS [ {Po , Pd }

      Po                                             Pd




¨    Primary Network: RP [ {Po , Pd }
¨    Secondary Network: RS
¨    Nodes are static and arbitrarily placed
¨    Nodes work in half-duplex mode, spatial reuse is not allowed
¨    ⇠P = EP /N0 : average received SNR between Po and Pd
¨    RP , RS : primary, secondary transmission rates [bits/s/Hz]

Cristiano Tapparello – Asilomar 2011                                 04/11/11
Problem formulation


      Po                           a              Pd

                        x
                                       y


¨    State of the system x ✓ T : subset of nodes that have
      correctly decoded the primary packet
¨    Action a 2 x : node selected to act as next-hop transmitter
¨    Next state y ◆ x : subset of nodes that have correctly
      decoded the packet after the transmission from a 2 x
Cristiano Tapparello – Asilomar 2011                         04/11/11
Transition probabilities

                                        da,n
      Po                           a                     Pd

                        x
                                        y



¨    Depend on outage probabilities
      ¤  Primary      transmitter:
                                                     ✓    RP
                                                                     ◆
                                                         2       1
                            pout (da,n ) = 1   exp              ⌘
                                                          ⇠P da,n
Cristiano Tapparello – Asilomar 2011                                     04/11/11
Transition probabilities (2)
                               a

      Po                                               Pd

                        x
                                       y


¨    Depend on outage probabilities
      ¤  Secondary         transmitter uses superposition coding
           n  Superposition of primary and secondary packet
           n  Decoding based on two decoders in parallel: 1) treat undesired
               packet as noise; 2) successive interference cancellation
Cristiano Tapparello – Asilomar 2011                                    04/11/11
Secondary QoS requirement
                               a
                    RS
                                       dS
      Po                                            Pd
                                            pout  ✏S
                        x
                                       y



¨    Secondary network QoS requirement Q = (dS , RS , ✏S )
      ¤  Transmission rate RS
      ¤  Maximum outage probability ✏S for a receiver located
          no further than dS

Cristiano Tapparello – Asilomar 2011                     04/11/11
Transition costs
                               a

      Po                                            Pd

                        x
                                       y


¨    Each transition entails a cost:
           c(x, a, y) = ↵cThr (x, a, y) + (1        ↵)cE (x, a, y)
¨    Primary end-to-end throughput cost:
                    cThr (x, a, y) = 1, 8 a 2 x

Cristiano Tapparello – Asilomar 2011                                 04/11/11
Transition costs (2)
                               a

      Po                                                  Pd

                        x
                                           y


¨    Each transition entails a cost:
           c(x, a, y) = ↵cThr (x, a, y) + (1               ↵)cE (x, a, y)
¨    Primary energy cost:
                                       (
                                           1   when a 2 RP [ {Po }
                  cE (x, a, y) =
                                           0   when a 2 RS
Cristiano Tapparello – Asilomar 2011                                        04/11/11
Optimal Routing Policies
¨  Starting state s and final state f
¨  Goal: minimize the total expected discounted cost
                               "+1                         #
                    def
                                X
                                        k
           J(s) = E⇡                        c(x, a, y) x0 = s , 0 <   <1
                                  k=0
¨    The problem is an instance of stochastic routing
      [Lott06]
¨    The optimal policy is an index policy
      ¤  global     ranking of the nodes
¨    A centralized algorithm and its distributed
      implementation is provided in [Lott06]
Cristiano Tapparello – Asilomar 2011                                       04/11/11
Heuristic Routing Policies
¨    The algorithm in [Lott06] requires full knowledge of the
      network topology and has time complexity O(|T |2 )
¨    We propose two low-complexity heuristic policies that
      only require local topology information
¨    Suitable for a distributed implementation
¨    Relay selection is made on-line by the current
      transmitter at each hop, based on local interactions
¨    Both policies uses a primary energy budget K to control
      the trade-off between the primary energy consumption
      and the end-to-end throughput
      ¤  maximum   number of primary relays that can be used
      ¤  stored within the packet
      ¤  decremented when a new primary relay is selected
Cristiano Tapparello – Asilomar 2011                            04/11/11
K-Closer
                                        K>0

      Po                           a          Pd


                                       K=0



¨  Nodes are ranked according to their distance from
    the destination Pd
¨  Budget K to control primary energy consumption



Cristiano Tapparello – Asilomar 2011                   04/11/11
K-Closer (2)

✔  Pros:
    ¤  Fully distributed and easy to implement
    ¤  Limited amount of information (ACK and NACK) and
        overhead (residual energy budget K)
✗  Cons:
    ¤  The primary energy budget K potentially limits the
        available multiuser diversity
    ¤  Can potentially select a relay with a small number of
        neighbors in its proximity


Cristiano Tapparello – Asilomar 2011                      04/11/11
K-One Step Look Ahead
                                                    (K-OSLA)
¨  K-OSLA improves K-Closer using an expected
    geographical advancement metric
¨  Each node a knows its distance from the destination                 a
    and shares it with other nodes
¨  Each node a builds the order sets:

      ¤    B(a) = n1 , n2 , . . . , n|B(a)| , with
                       ni+1  a , for i = 1, . . . , |B(a)| 1
                      ni
      ¤    B S (a) ✓ B(a) , which only contains secondary nodes
¨    ga,n =      denotes the geographical advancement
                  a        n
      of a toward Pd provided by a relay n
Cristiano Tapparello – Asilomar 2011                         04/11/11
K-OSLA (2)
¨    Expected geographical advancement metrics:
                     |B(a)|                                 |B(a)|
                     X                                       Y
      ¤    ga =              ga,ni [1     pout (a, ni )]            pout (a, nj )
                      i=1                                   j=i+1

                     |BS (a)|                                 |BS (a)|
                      X                                         Y
             S
      ¤    ga   =              ga,mi [1     pout (a, mi )]              pout (a, mj )
                       i=1                                    j=i+1

¨    At each hop, the possible relays are ranked according to
      the metrics:
      ¤    Ga,n = ga,n + gn when K > 1
      ¤    Ga,n = ga,n + gn when K = 1 and a 2 RS
      ¤    GS = ga,n + gn otherwise
             a,n
                           S

Cristiano Tapparello – Asilomar 2011                                                 04/11/11
K-OSLA (3)

✔  Pros:
    ¤  Fullydistributed and easy to implement
    ¤  Prevents the packet to be forwarded towards
        connectivity holes
✗  Cons:
    ¤  Requires  exchange of additional information
                                                 S
    ¤  Additional pre-computation for gn and gn

    ¤  The energy budget K potentially limits the available
        multiuser diversity


Cristiano Tapparello – Asilomar 2011                    04/11/11
Numerical Results:
                                                           Optimal vs Heuristics
                                                                           Optimal
                                 0.6                                      K-OSLA
                                                           α=1            K-Closer
                                                                    Optimal, No SL
                                 0.5                               K-OSLA, No SL
        Throughput [bits/s/Hz]



                                                                   K-Closer, No SL
                                                                 K=8
                                 0.4


                                 0.3

                                           α=0
                                 0.2
                                                     K=0
                                 0.1
                                       0         2   4        6         8        10   12
                                                     Primary Energy [dB]
Cristiano Tapparello – Asilomar 2011                                                   04/11/11
Numerical Results: Impact of
                                               Secondary network density
                                           NS = 12                  K-OSLA, K=8
                                 0.6                                K-Closer, K=8
                                                                     Optimal, =1

                                 0.5
        Throughput [bits/s/Hz]




                                 0.4


                                 0.3                                                NS = 0


                                 0.2


                                 0.1
                                       4   5     6    7       8      9     10       11       12
                                                     Primary Energy [dB]
Cristiano Tapparello – Asilomar 2011                                                          04/11/11
Numerical Results: Impact of
                                                        budget K on K-Osla
                                                         NS = 12    Optimal, = 0
                                 0.6               K=8              Optimal, = 1
                                                                         K-OSLA
                                 0.5
        Throughput [bits/s/Hz]




                                 0.4
                                                                            NS = 2
                                           K=0
                                 0.3


                                 0.2


                                 0.1

                                       0     2       4        6         8      10    12
                                                     Primary Energy [dB]
Cristiano Tapparello – Asilomar 2011                                                  04/11/11
Conclusions
¨  Spectrum leasing solution to the problem of
    coexistence of primary and secondary nodes
¨  The problem is formulated as a stochastic routing

    problem to obtain optimal policies
¨  Two reduced complexity heuristics have been

    proposed and they achieve close-to-optimal
    performance
¨  Optimal and heuristic policies improve both primary

    energy and throughput

Cristiano Tapparello – Asilomar 2011              04/11/11
Refences
¨    [Larsson01]: P. Larsson, “Selection Diversity Forwarding in a Multihop Packet Radio Network with
      Fading Channel and Capture,” ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 5, no. 4, pp. 47–
      54, Oct. 2001.
¨    [Zorzi03]: M. Zorzi and R. Rao, “Geographic random forwarding (GeRaF) for ad hoc and sensor
      networks: multihop performance,” IEEE Trans. Mobile Comput., vol. 2, no. 4, pp. 337–348, Oct. 2003.
¨    [Morris04]: S. Biswas and R. Morris, “Opportunistic Routing in Multi-Hop Wireless Networks,” ACM
      SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, Jan. 2004.
¨    [Javidi09]: M. Naghshvar, H. Zhuang, and T. Javidi, “A General Class of Throughput Optimal Routing
      Policies in Multi-hop Wireless Networks,” preprint, http://arxiv.org/pdf/0908.1273.
¨    [Chiarotto10]: D. Chiarotto, O. Simeone, M. Zorzi, ”Throughput and Energy Efficiency of Opportunistic
      Routing with type-I HARQ in Linear Multihop Networks”, in Proc. of IEEE GlobeCom, Miami, FL, 6–10
      Dec. 2010.
¨    [Simeone08]: O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz,
      “Spectrum Leasing to Cooperating Secondary Ad Hoc Networks,” IEEE J. Select. Areas Commun., vol.
      26, no. 1, Jan. 2008.
¨    [Lott06]: C. Lott and D. Teneketzis, “Stochastic routing in ad hoc networks”, IEEE Transactions on
      Automatic Control, vol. 51, no.1, Jan. 2006.
¨    [Chiarotto11]: D. Chiarotto, O. Simeone and M. Zorzi, “Spectrum leasing via cooperative
      opportunistic routing”, IEEE Transactions on Wireless Communications, Vol. 10, no. 9, Sep. 2011



Cristiano Tapparello – Asilomar 2011                                                             04/11/11
Spectrum Leasing via Cooperative
Opportunistic Routing in Distributed Ad Hoc
Networks: Optimal and Heuristic Policies

Cristiano Tapparello
Davide Chiarotto, Michele Rossi, Osvaldo
Simeone and Michele Zorzi




                                           04/11/11
Optimal Routing Policies:
                                         transition probabilities
               8
               >0
               >                            (Pd 2 x or x = f ) and y 6= f
               >
               <1                           (Pd 2 x or x = f ) and y = f
     pxy (a) =
               >0
               >                            Pd 2 x, x 6= f and y = f
                                               /
               >
               :
                 Pxy (a)                    Pd 2 x, x 6= f and y 6= f
                                               /

                            Y                                  Y
       Pxy (a) =                       [1     pout (a, n)]              pout (a, m)
                        n2T s.t.                             m2T s.t.
                        n2y,n2x
                              /                               m2y
                                                                /




Cristiano Tapparello – Asilomar 2011                                                  04/11/11
Secondary transmissions
                                                    h           ⇣               ⌘i
                                                                     (1)  (2)
         Pout,SP (da,n ) = 1                exp           min       HP , HP


              (
          (1)
               1, 0   1                             2 RP
         HP =       2 RP 1                                           RP
                       (1 (1           )2RP )⇠       ⌘ , 1 2              <   1
                                                 S da,n




              (   n    RS             RP
                                             o
          (2)  max (1 2 RS )⇠1 d ⌘ , 2⇠ d 1 , 0 <
                                           ⌘                                         <2   RS
         HP =         2      S a,n     S a,n
               1, = 0 and 2 RS   1


Cristiano Tapparello – Asilomar 2011                                                      04/11/11

More Related Content

What's hot

BM25 Scoring for Lucene: From Academia to Industry
BM25 Scoring for Lucene: From Academia to IndustryBM25 Scoring for Lucene: From Academia to Industry
BM25 Scoring for Lucene: From Academia to Industry
yuvalf
 
Dw24779784
Dw24779784Dw24779784
Dw24779784
IJERA Editor
 
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformSuppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
CSCJournals
 
Z24 4 Speech Compression
Z24   4   Speech CompressionZ24   4   Speech Compression
Z24 4 Speech Compression
anithabalaprabhu
 
Resolution enhancement of low-quality videos using a high-resolution frame
Resolution enhancement of low-quality videos using a high-resolution frameResolution enhancement of low-quality videos using a high-resolution frame
Resolution enhancement of low-quality videos using a high-resolution frame
Tuan Q. Pham
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
Yoss Cohen
 
goGPS (March 2010)
goGPS (March 2010)goGPS (March 2010)
goGPS (March 2010)
Eugenio Realini
 
A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...
A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...
A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...
Giacomo Verticale
 
[12] Nup 07 3
[12] Nup 07 3[12] Nup 07 3
[12] Nup 07 3
Rafael Scudelari
 
Hi3114131415
Hi3114131415Hi3114131415
Hi3114131415
IJERA Editor
 
Sistec ppt
Sistec pptSistec ppt
Sistec ppt
hemant choubey
 
Foss4g2009tokyo Realini Go Gps
Foss4g2009tokyo Realini Go GpsFoss4g2009tokyo Realini Go Gps
Foss4g2009tokyo Realini Go Gps
OSgeo Japan
 
20080426 distributed algorithms_pedone_lecture04
20080426 distributed algorithms_pedone_lecture0420080426 distributed algorithms_pedone_lecture04
20080426 distributed algorithms_pedone_lecture04
Computer Science Club
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
ManochandarThenralma
 
Lecture5c
Lecture5cLecture5c
Lecture5c
chenlahero
 
Ig2616051609
Ig2616051609Ig2616051609
Ig2616051609
IJERA Editor
 
A collaborative wireless sensor network routing
A collaborative wireless sensor network routingA collaborative wireless sensor network routing
A collaborative wireless sensor network routing
ambitlick
 
Mobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentationMobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentation
Pierre LARREGLE
 
Chap05 gtp 03_kh
Chap05 gtp 03_khChap05 gtp 03_kh
Chap05 gtp 03_kh
Farzad Ramin
 
An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks
An Efficient Data Collection Protocol for Underwater Wireless Sensor NetworksAn Efficient Data Collection Protocol for Underwater Wireless Sensor Networks
An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks
IJCNCJournal
 

What's hot (20)

BM25 Scoring for Lucene: From Academia to Industry
BM25 Scoring for Lucene: From Academia to IndustryBM25 Scoring for Lucene: From Academia to Industry
BM25 Scoring for Lucene: From Academia to Industry
 
Dw24779784
Dw24779784Dw24779784
Dw24779784
 
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformSuppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
 
Z24 4 Speech Compression
Z24   4   Speech CompressionZ24   4   Speech Compression
Z24 4 Speech Compression
 
Resolution enhancement of low-quality videos using a high-resolution frame
Resolution enhancement of low-quality videos using a high-resolution frameResolution enhancement of low-quality videos using a high-resolution frame
Resolution enhancement of low-quality videos using a high-resolution frame
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
goGPS (March 2010)
goGPS (March 2010)goGPS (March 2010)
goGPS (March 2010)
 
A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...
A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...
A Closed-Form Expression for Queuing Delay in Rayleigh Fading Channels Using ...
 
[12] Nup 07 3
[12] Nup 07 3[12] Nup 07 3
[12] Nup 07 3
 
Hi3114131415
Hi3114131415Hi3114131415
Hi3114131415
 
Sistec ppt
Sistec pptSistec ppt
Sistec ppt
 
Foss4g2009tokyo Realini Go Gps
Foss4g2009tokyo Realini Go GpsFoss4g2009tokyo Realini Go Gps
Foss4g2009tokyo Realini Go Gps
 
20080426 distributed algorithms_pedone_lecture04
20080426 distributed algorithms_pedone_lecture0420080426 distributed algorithms_pedone_lecture04
20080426 distributed algorithms_pedone_lecture04
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
 
Lecture5c
Lecture5cLecture5c
Lecture5c
 
Ig2616051609
Ig2616051609Ig2616051609
Ig2616051609
 
A collaborative wireless sensor network routing
A collaborative wireless sensor network routingA collaborative wireless sensor network routing
A collaborative wireless sensor network routing
 
Mobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentationMobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentation
 
Chap05 gtp 03_kh
Chap05 gtp 03_khChap05 gtp 03_kh
Chap05 gtp 03_kh
 
An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks
An Efficient Data Collection Protocol for Underwater Wireless Sensor NetworksAn Efficient Data Collection Protocol for Underwater Wireless Sensor Networks
An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 

Asilomar 2011

  • 1. Spectrum Leasing via Cooperative Opportunistic Routing in Distributed Ad Hoc Networks: Optimal and Heuristic Policies Cristiano Tapparello Davide Chiarotto, Michele Rossi, Osvaldo Simeone and Michele Zorzi 04/11/11
  • 2. Outline ¨  Cognitive radio ¨  Spectrum leasing and opportunistic routing ¨  Optimal policies ¨  Heuristic policies ¨  Numerical Results ¨  Conclusions Cristiano Tapparello – Asilomar 2011 04/11/11
  • 3. Cognitive Radio ¨  Coexistence  of:   q  primary  network:  licensed   q  secondary  network:  unlicensed   ¨  Common  model:   q  primary  users  are  oblivious  to  the  presence  of  secondary  users   q  secondary   users   sense   the   radio   environment   in   search   of   spectrum  holes   q  Performance  limited  by  sensing  errors   ¨  Spectrum  leasing:   q  primary   users   lease   part   of   the   (licensed)   spectrum   to   secondary  users  in  exchange  for  appropriate  remunera?on   Cristiano Tapparello – Asilomar 2011 04/11/11
  • 4. Spectrum leasing via cooperation [Simeone08] ¨  Remuneration is offered by the secondary users in the form of cooperation (relaying) ¨  Secondary users accept to cooperate if leased enough spectral resources to satisfy QoS requirements Cristiano Tapparello – Asilomar 2011 04/11/11
  • 5. Opportunistic routing Po Pd ¨  Leverages broadcast nature of wireless channel ¨  Next hop selected in an adaptive manner, based on: q  current channel conditions (relay availability) [Larsson01] q  distance to destination [Zorzi03, Morris04] q  delay and congestion criteria [Javidi09] Cristiano Tapparello – Asilomar 2011 04/11/11
  • 6. Spectrum leasing via opportunistic cooperative routing = primary = secondary Po Pd ¨  Spectrum leasing with remuneration offered by secondary network via forwarding ¨  Secondary nodes act as potential next hops ¨  Secondary nodes accept to cooperate if QoS requirements are satisfied Cristiano Tapparello – Asilomar 2011 04/11/11
  • 7. Optimization goal Po Pd ¨  Find  op?mal  next-­‐hop  selec?on  policies:   ¤  Primary  end-­‐to-­‐end  throughput   ¤  Primary  energy  consump?on   ¨  Spectrum  leasing  subject  to  secondary  QoS   requirements   Cristiano Tapparello – Asilomar 2011 04/11/11
  • 8. System model T = RP [ RS [ {Po , Pd } Po Pd ¨  Primary Network: RP [ {Po , Pd } ¨  Secondary Network: RS ¨  Nodes are static and arbitrarily placed ¨  Nodes work in half-duplex mode, spatial reuse is not allowed ¨  ⇠P = EP /N0 : average received SNR between Po and Pd ¨  RP , RS : primary, secondary transmission rates [bits/s/Hz] Cristiano Tapparello – Asilomar 2011 04/11/11
  • 9. Problem formulation Po a Pd x y ¨  State of the system x ✓ T : subset of nodes that have correctly decoded the primary packet ¨  Action a 2 x : node selected to act as next-hop transmitter ¨  Next state y ◆ x : subset of nodes that have correctly decoded the packet after the transmission from a 2 x Cristiano Tapparello – Asilomar 2011 04/11/11
  • 10. Transition probabilities da,n Po a Pd x y ¨  Depend on outage probabilities ¤  Primary transmitter: ✓ RP ◆ 2 1 pout (da,n ) = 1 exp ⌘ ⇠P da,n Cristiano Tapparello – Asilomar 2011 04/11/11
  • 11. Transition probabilities (2) a Po Pd x y ¨  Depend on outage probabilities ¤  Secondary transmitter uses superposition coding n  Superposition of primary and secondary packet n  Decoding based on two decoders in parallel: 1) treat undesired packet as noise; 2) successive interference cancellation Cristiano Tapparello – Asilomar 2011 04/11/11
  • 12. Secondary QoS requirement a RS dS Po Pd pout  ✏S x y ¨  Secondary network QoS requirement Q = (dS , RS , ✏S ) ¤  Transmission rate RS ¤  Maximum outage probability ✏S for a receiver located no further than dS Cristiano Tapparello – Asilomar 2011 04/11/11
  • 13. Transition costs a Po Pd x y ¨  Each transition entails a cost: c(x, a, y) = ↵cThr (x, a, y) + (1 ↵)cE (x, a, y) ¨  Primary end-to-end throughput cost: cThr (x, a, y) = 1, 8 a 2 x Cristiano Tapparello – Asilomar 2011 04/11/11
  • 14. Transition costs (2) a Po Pd x y ¨  Each transition entails a cost: c(x, a, y) = ↵cThr (x, a, y) + (1 ↵)cE (x, a, y) ¨  Primary energy cost: ( 1 when a 2 RP [ {Po } cE (x, a, y) = 0 when a 2 RS Cristiano Tapparello – Asilomar 2011 04/11/11
  • 15. Optimal Routing Policies ¨  Starting state s and final state f ¨  Goal: minimize the total expected discounted cost "+1 # def X k J(s) = E⇡ c(x, a, y) x0 = s , 0 < <1 k=0 ¨  The problem is an instance of stochastic routing [Lott06] ¨  The optimal policy is an index policy ¤  global ranking of the nodes ¨  A centralized algorithm and its distributed implementation is provided in [Lott06] Cristiano Tapparello – Asilomar 2011 04/11/11
  • 16. Heuristic Routing Policies ¨  The algorithm in [Lott06] requires full knowledge of the network topology and has time complexity O(|T |2 ) ¨  We propose two low-complexity heuristic policies that only require local topology information ¨  Suitable for a distributed implementation ¨  Relay selection is made on-line by the current transmitter at each hop, based on local interactions ¨  Both policies uses a primary energy budget K to control the trade-off between the primary energy consumption and the end-to-end throughput ¤  maximum number of primary relays that can be used ¤  stored within the packet ¤  decremented when a new primary relay is selected Cristiano Tapparello – Asilomar 2011 04/11/11
  • 17. K-Closer K>0 Po a Pd K=0 ¨  Nodes are ranked according to their distance from the destination Pd ¨  Budget K to control primary energy consumption Cristiano Tapparello – Asilomar 2011 04/11/11
  • 18. K-Closer (2) ✔  Pros: ¤  Fully distributed and easy to implement ¤  Limited amount of information (ACK and NACK) and overhead (residual energy budget K) ✗  Cons: ¤  The primary energy budget K potentially limits the available multiuser diversity ¤  Can potentially select a relay with a small number of neighbors in its proximity Cristiano Tapparello – Asilomar 2011 04/11/11
  • 19. K-One Step Look Ahead (K-OSLA) ¨  K-OSLA improves K-Closer using an expected geographical advancement metric ¨  Each node a knows its distance from the destination a and shares it with other nodes ¨  Each node a builds the order sets: ¤  B(a) = n1 , n2 , . . . , n|B(a)| , with  ni+1  a , for i = 1, . . . , |B(a)| 1 ni ¤  B S (a) ✓ B(a) , which only contains secondary nodes ¨  ga,n = denotes the geographical advancement a n of a toward Pd provided by a relay n Cristiano Tapparello – Asilomar 2011 04/11/11
  • 20. K-OSLA (2) ¨  Expected geographical advancement metrics: |B(a)| |B(a)| X Y ¤  ga = ga,ni [1 pout (a, ni )] pout (a, nj ) i=1 j=i+1 |BS (a)| |BS (a)| X Y S ¤  ga = ga,mi [1 pout (a, mi )] pout (a, mj ) i=1 j=i+1 ¨  At each hop, the possible relays are ranked according to the metrics: ¤  Ga,n = ga,n + gn when K > 1 ¤  Ga,n = ga,n + gn when K = 1 and a 2 RS ¤  GS = ga,n + gn otherwise a,n S Cristiano Tapparello – Asilomar 2011 04/11/11
  • 21. K-OSLA (3) ✔  Pros: ¤  Fullydistributed and easy to implement ¤  Prevents the packet to be forwarded towards connectivity holes ✗  Cons: ¤  Requires exchange of additional information S ¤  Additional pre-computation for gn and gn ¤  The energy budget K potentially limits the available multiuser diversity Cristiano Tapparello – Asilomar 2011 04/11/11
  • 22. Numerical Results: Optimal vs Heuristics Optimal 0.6 K-OSLA α=1 K-Closer Optimal, No SL 0.5 K-OSLA, No SL Throughput [bits/s/Hz] K-Closer, No SL K=8 0.4 0.3 α=0 0.2 K=0 0.1 0 2 4 6 8 10 12 Primary Energy [dB] Cristiano Tapparello – Asilomar 2011 04/11/11
  • 23. Numerical Results: Impact of Secondary network density NS = 12 K-OSLA, K=8 0.6 K-Closer, K=8 Optimal, =1 0.5 Throughput [bits/s/Hz] 0.4 0.3 NS = 0 0.2 0.1 4 5 6 7 8 9 10 11 12 Primary Energy [dB] Cristiano Tapparello – Asilomar 2011 04/11/11
  • 24. Numerical Results: Impact of budget K on K-Osla NS = 12 Optimal, = 0 0.6 K=8 Optimal, = 1 K-OSLA 0.5 Throughput [bits/s/Hz] 0.4 NS = 2 K=0 0.3 0.2 0.1 0 2 4 6 8 10 12 Primary Energy [dB] Cristiano Tapparello – Asilomar 2011 04/11/11
  • 25. Conclusions ¨  Spectrum leasing solution to the problem of coexistence of primary and secondary nodes ¨  The problem is formulated as a stochastic routing problem to obtain optimal policies ¨  Two reduced complexity heuristics have been proposed and they achieve close-to-optimal performance ¨  Optimal and heuristic policies improve both primary energy and throughput Cristiano Tapparello – Asilomar 2011 04/11/11
  • 26. Refences ¨  [Larsson01]: P. Larsson, “Selection Diversity Forwarding in a Multihop Packet Radio Network with Fading Channel and Capture,” ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 5, no. 4, pp. 47– 54, Oct. 2001. ¨  [Zorzi03]: M. Zorzi and R. Rao, “Geographic random forwarding (GeRaF) for ad hoc and sensor networks: multihop performance,” IEEE Trans. Mobile Comput., vol. 2, no. 4, pp. 337–348, Oct. 2003. ¨  [Morris04]: S. Biswas and R. Morris, “Opportunistic Routing in Multi-Hop Wireless Networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, Jan. 2004. ¨  [Javidi09]: M. Naghshvar, H. Zhuang, and T. Javidi, “A General Class of Throughput Optimal Routing Policies in Multi-hop Wireless Networks,” preprint, http://arxiv.org/pdf/0908.1273. ¨  [Chiarotto10]: D. Chiarotto, O. Simeone, M. Zorzi, ”Throughput and Energy Efficiency of Opportunistic Routing with type-I HARQ in Linear Multihop Networks”, in Proc. of IEEE GlobeCom, Miami, FL, 6–10 Dec. 2010. ¨  [Simeone08]: O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, “Spectrum Leasing to Cooperating Secondary Ad Hoc Networks,” IEEE J. Select. Areas Commun., vol. 26, no. 1, Jan. 2008. ¨  [Lott06]: C. Lott and D. Teneketzis, “Stochastic routing in ad hoc networks”, IEEE Transactions on Automatic Control, vol. 51, no.1, Jan. 2006. ¨  [Chiarotto11]: D. Chiarotto, O. Simeone and M. Zorzi, “Spectrum leasing via cooperative opportunistic routing”, IEEE Transactions on Wireless Communications, Vol. 10, no. 9, Sep. 2011 Cristiano Tapparello – Asilomar 2011 04/11/11
  • 27. Spectrum Leasing via Cooperative Opportunistic Routing in Distributed Ad Hoc Networks: Optimal and Heuristic Policies Cristiano Tapparello Davide Chiarotto, Michele Rossi, Osvaldo Simeone and Michele Zorzi 04/11/11
  • 28. Optimal Routing Policies: transition probabilities 8 >0 > (Pd 2 x or x = f ) and y 6= f > <1 (Pd 2 x or x = f ) and y = f pxy (a) = >0 > Pd 2 x, x 6= f and y = f / > : Pxy (a) Pd 2 x, x 6= f and y 6= f / Y Y Pxy (a) = [1 pout (a, n)] pout (a, m) n2T s.t. m2T s.t. n2y,n2x / m2y / Cristiano Tapparello – Asilomar 2011 04/11/11
  • 29. Secondary transmissions h ⇣ ⌘i (1) (2) Pout,SP (da,n ) = 1 exp min HP , HP ( (1) 1, 0   1 2 RP HP = 2 RP 1 RP (1 (1 )2RP )⇠ ⌘ , 1 2 < 1 S da,n ( n RS RP o (2) max (1 2 RS )⇠1 d ⌘ , 2⇠ d 1 , 0 < ⌘ <2 RS HP = 2 S a,n S a,n 1, = 0 and 2 RS   1 Cristiano Tapparello – Asilomar 2011 04/11/11