The relay node with linear relaying transmits the linear combination of its past received signals.The optimization of two-hop relay channel with linear relaying is discussed in this paper.The capacity for the two-hop ...The relay node with linear relaying transmits the linear combination of its past received signals.The optimization of two-hop relay channel with linear relaying is discussed in this paper.The capacity for the two-hop Gaussian relay channel with linear relaying is derived,which can be formulated as an optimization problem over the relaying matrix and the covariance matrix of the signals transmitted at the source.It is proved that the solution to this optimization problem is equivalent to a "single-letter" optimization problem.We also show that the solution to this "single-letter" optimization problem has the same form as the expression of the rate achieved by Time-Sharing Amplify and Forward(TSAF).In order to solve this equivalent problem,we proposed an iterative algorithm.Simulation results show that if channel gain of one hop is relatively smaller,the achievable rate with TSAF is closer to the max-flow min-cut capacity bound,but at a lower complexity.展开更多
This paper presented a scheme of two-hop cellular network with fixed relay nodes (FRN). Based on this scheme, co-channel interference and signal interference ratio(SIR) received by base station(BS) and FRN were analyz...This paper presented a scheme of two-hop cellular network with fixed relay nodes (FRN). Based on this scheme, co-channel interference and signal interference ratio(SIR) received by base station(BS) and FRN were analyzed. Both the theoretical analysis and simulation results show that the SIR can be improved significantly when relays are employed in the network. The higher spectral efficiency can be obtained due to the improved two-hop link quality through the use of adaptive modulation and coding (AMC). The antenna height of FRN and the cell radius of BS and that of FRN influence SIR received by BS and FRN and the system spectral efficiency greatly. The proper antenna height of FRN and cell radius of BS and that of FRN were also given to get the highest spectral efficiency.展开更多
A Two-hop Wireless Network (TWN) is the basic topology structure that provides network coding opportunity for improving throughput. Network coding on a homogeneous TWN, in which all the data flows have the same packet...A Two-hop Wireless Network (TWN) is the basic topology structure that provides network coding opportunity for improving throughput. Network coding on a homogeneous TWN, in which all the data flows have the same packet size and all the links have the same transmission rate, has been extensively investigated. In this paper, network coding on more practical heterogeneous TWNs, featured by various packet sizes and transmission rates, is studied. Based on the Markov model, the throughput of the proposed network coding scheme, together with the throughput gain, is derived, which matches the simulation results very well. Numerical analyses indicate that, encoding the packets with close size and close transmission rate and enlarging buffer size at the relay node help in improving the throughput gain.展开更多
Multihop cellular networks is an exciting and a fledgling area of wireless communication which offers huge potential in terms of coverage enhancement, data-rates, power reduction, and various other quality of service ...Multihop cellular networks is an exciting and a fledgling area of wireless communication which offers huge potential in terms of coverage enhancement, data-rates, power reduction, and various other quality of service improvements. However, resource allocation in MCN is an NP-hard problem. Hence, significant research needs to be done in this field in order to efficiently design the radio network. In this paper, optimal position of relay stations in a hierarchical cluster-based two-hop cellular network is investigated. Vector algebra has been used to derive general equation for carrier-to-interference ratio (C/I) of a mobile station. It has been observed that when the transmit power of base station (BS) and the gateway (GTW)/relay station (RS) are same, the RSs should be located close to mid-point of BS and the edge of the cell. However, significantly, when the transmit power of the BS is greater than that of the GTW, then the RSs should be placed closer to the edge of the cell, in order to maximize the minimum C/I at any point in the cell. This in turn results in higher modulation technique at the physical layer, and hence, a higher data-rate to all the users in the system.展开更多
To enhance the reliability of long wireless link, a relay is placed between transmitter and receiver which break the link into two parts: transmitter to relay called 1st hop and relay to receiver called 2nd hop;such a...To enhance the reliability of long wireless link, a relay is placed between transmitter and receiver which break the link into two parts: transmitter to relay called 1st hop and relay to receiver called 2nd hop;such arrangement is called two hop wireless links. In two-hop wireless communication sometimes 1st and 2nd hops are affected by different types of fading called asymmetric fading environment. In this paper we consider four different combinations of Rayleigh and Nakagami-m fading on 1st and 2nd hop to observe the profile of combined pdf (probability density function) and cdf (cumulative distribution function). With the help of cdf we determine the variation of outage probability of mixed fading. Finally we plot the SER (symbol error rate) against the SNR (signal to noise ratio) of the 2nd hop for all possible combinations of the two fading taking the SNR of 1st hop as a parameter. Although recent literature deals with asymmetric fading environment but in this paper instead of details statistical model of such fading we provide the relative scenario of mixed fading on 2-hop wireless link.展开更多
In a traditional cellular system, the call requests initiated by mobile stations (MSs) must be carded through a base station (BS) via the cellular interface, but when MSs are located in the dead spots, their call ...In a traditional cellular system, the call requests initiated by mobile stations (MSs) must be carded through a base station (BS) via the cellular interface, but when MSs are located in the dead spots, their call requests will be blocked because the MSs cannot communicate with the BS. It is considered to relay these blocked calls requested using Ad-hoc network, which will improve the performance of the system as a whole. This article first introduces a novel architecture of the two-hop-relay cellular system in the dead spots, and then analyzes and compares the call blocking rate of the traditional cellular and the two-hop-relay cellular system respectively under three different conditions. The first and second conditions are the traditional cellular system without and with taking account of the effect of the dead spots. The third condition is the two-hop-relay cellular system with taking account of the effect of the dead spots. Numerical analytical result shows that the two-hop-relay cellular system can obtain lower call blocking rate than the traditional cellular system when considering the effect of dead spots. Consequently, this novel architecture can resolve the problem of coverage limitation of a traditional cellular system effectively.展开更多
Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious c...Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious communication link by two full-duplex legitimate monitors(LMs)based on multi-agent deep deterministic policy gradient(MADDPG)algorithm in two phases.In phase 1,the suspicious transmitter sends information to the suspicious assistant relay,and the assistant relay decodes and forwards the received message to the suspicious receiver in phase 2.Meanwhile,two LMs cooperatively emit jamming to suspicious relay and receiver during each phase.Particularly,each LM is considered to be an energy-limited device,and eavesdropping is a long-term process,so we adopt expected eavesdropping energy efficiency(EEE)over a period of time to evaluate eavesdropping performance.However,for two LMs,how to cooperatively make jamming power decision at each hop in a dynamic environment is a huge challenge.Therefore,MADDPG algorithm,as a multi-agent reinforcement learning approach with the advantage of dynamic decision-making,is utilized to solve the issue of jamming power decision for each LM.In the simulation,the results show that our proposed cooperative jamming scheme can obtain higher expected EEE.展开更多
To fully exploit the performance benefits of relay station (RS), in the two-hop cellular networks covering hotspots, when the number of RSs is predetermined, both RS deployment and frequency reuse scheme are jointly...To fully exploit the performance benefits of relay station (RS), in the two-hop cellular networks covering hotspots, when the number of RSs is predetermined, both RS deployment and frequency reuse scheme are jointly optimized for the purpose of maximizing the system capacity based on the constraints of system demand of capacity and the maximum number of outage demand nodes (MNDN). Further, considering the overhead of increasing RSs, it is desired to use minimum number of RSs. The joint RS deployment and frequency reuse scheme (JRDFR) problem is formulated into a mixed integer nonlinear programming, which is non-deterministic polynomial-time hard in general. A heuristic approach based on genetic algorithm is proposed to tackle the JRDFR problem. The computational experiment of the heuristic approach is achieved and optimized RS deployment and frequency reuse scheme is obtained. Finally, we discuss the impacts of MNDN and the number of RSs on the system performance.展开更多
提出了一种基于邻居节点监听的虚假数据过滤策略(false reports filtering scheme based on neighbor watch,NWFFS).在NWFFS策略中,每个节点保存两跳邻居节点信息,每个数据包必须包含T个来自不同密钥分区节点的ID及其生成的MAC.除生成...提出了一种基于邻居节点监听的虚假数据过滤策略(false reports filtering scheme based on neighbor watch,NWFFS).在NWFFS策略中,每个节点保存两跳邻居节点信息,每个数据包必须包含T个来自不同密钥分区节点的ID及其生成的MAC.除生成数据包的簇头节点外,每个中间节点向其下游节点转发数据包后,还需向自己的上游节点发送ACK包,通过对ACK包的监听,恶意节点利用其他区域俘获节点信息伪造的虚假数据包将被其一跳邻居识别出来,同时中间节点和Sink节点利用自身携带的密钥对少部分逃脱的虚假数据包进行进一步验证.理论分析和实验表明,该策略有效地避免了恶意节点利用任意区域已被其俘获的节点伪造虚假数据而不被识别出来,提高了途中过滤效率,从而降低了恶意节点对网络的影响,延长了网络生存期.展开更多
描述了两跳MIMO(Multiple-input and Multiple-output)中继系统模型,概述了中继通用的转发策略以及系统性能分析常涉及到的信道模型和信源发射方案,详细介绍了两跳MIMO中继系统通信性能分析国内外的研究进展,通过一个具体的例子比较了...描述了两跳MIMO(Multiple-input and Multiple-output)中继系统模型,概述了中继通用的转发策略以及系统性能分析常涉及到的信道模型和信源发射方案,详细介绍了两跳MIMO中继系统通信性能分析国内外的研究进展,通过一个具体的例子比较了不同发射策略系统的性能,最后探讨和展望了两跳MIMO中继系统下一步的研究方向。MIMO中继系统的性能分析为MIMO中继系统的工程应用提供了有价值的理论参考。展开更多
基金supported by the National Natural Science Foundation of China under Grants No.60972045,No.61071089the Natural Science Foundation of Jiangsu Province under Grant No. BK2010077+4 种基金the Open Project of State Key Laboratory of Networking and Switching under Grant No.SKLNST-2009-1-12the Priority Academic Program Development of Jiangsu Provincethe University Postgraduate Research and Innovation Project in Jiangsu Province under Grant No.CXZZ11_0395the Fundamental Research Funds for the Central Universities under Grant No.2009B32114the Excellent Innovative Research Team of High Schools in Jiangsu Province under Grant No.TJ208029
文摘The relay node with linear relaying transmits the linear combination of its past received signals.The optimization of two-hop relay channel with linear relaying is discussed in this paper.The capacity for the two-hop Gaussian relay channel with linear relaying is derived,which can be formulated as an optimization problem over the relaying matrix and the covariance matrix of the signals transmitted at the source.It is proved that the solution to this optimization problem is equivalent to a "single-letter" optimization problem.We also show that the solution to this "single-letter" optimization problem has the same form as the expression of the rate achieved by Time-Sharing Amplify and Forward(TSAF).In order to solve this equivalent problem,we proposed an iterative algorithm.Simulation results show that if channel gain of one hop is relatively smaller,the achievable rate with TSAF is closer to the max-flow min-cut capacity bound,but at a lower complexity.
基金National Science Fund for Creative ResearchGroups (No. 60521002) Chinese NationalKey Technology R&D Program(No. 2005-BA908B02)Science Foundation of ShanghaiMunicipal Commission of Science and Tech-nology(No.05dz05802)
文摘This paper presented a scheme of two-hop cellular network with fixed relay nodes (FRN). Based on this scheme, co-channel interference and signal interference ratio(SIR) received by base station(BS) and FRN were analyzed. Both the theoretical analysis and simulation results show that the SIR can be improved significantly when relays are employed in the network. The higher spectral efficiency can be obtained due to the improved two-hop link quality through the use of adaptive modulation and coding (AMC). The antenna height of FRN and the cell radius of BS and that of FRN influence SIR received by BS and FRN and the system spectral efficiency greatly. The proper antenna height of FRN and cell radius of BS and that of FRN were also given to get the highest spectral efficiency.
基金Supported by the National Natural Science Foundation of China(No.61070190 and 61001126)Zhejiang Provincial Natural Science Foundation of China(No.Z1100455)Ph.D.Programs Foundation of Ministry of Education of China(No.20123317110002)
文摘A Two-hop Wireless Network (TWN) is the basic topology structure that provides network coding opportunity for improving throughput. Network coding on a homogeneous TWN, in which all the data flows have the same packet size and all the links have the same transmission rate, has been extensively investigated. In this paper, network coding on more practical heterogeneous TWNs, featured by various packet sizes and transmission rates, is studied. Based on the Markov model, the throughput of the proposed network coding scheme, together with the throughput gain, is derived, which matches the simulation results very well. Numerical analyses indicate that, encoding the packets with close size and close transmission rate and enlarging buffer size at the relay node help in improving the throughput gain.
文摘Multihop cellular networks is an exciting and a fledgling area of wireless communication which offers huge potential in terms of coverage enhancement, data-rates, power reduction, and various other quality of service improvements. However, resource allocation in MCN is an NP-hard problem. Hence, significant research needs to be done in this field in order to efficiently design the radio network. In this paper, optimal position of relay stations in a hierarchical cluster-based two-hop cellular network is investigated. Vector algebra has been used to derive general equation for carrier-to-interference ratio (C/I) of a mobile station. It has been observed that when the transmit power of base station (BS) and the gateway (GTW)/relay station (RS) are same, the RSs should be located close to mid-point of BS and the edge of the cell. However, significantly, when the transmit power of the BS is greater than that of the GTW, then the RSs should be placed closer to the edge of the cell, in order to maximize the minimum C/I at any point in the cell. This in turn results in higher modulation technique at the physical layer, and hence, a higher data-rate to all the users in the system.
文摘To enhance the reliability of long wireless link, a relay is placed between transmitter and receiver which break the link into two parts: transmitter to relay called 1st hop and relay to receiver called 2nd hop;such arrangement is called two hop wireless links. In two-hop wireless communication sometimes 1st and 2nd hops are affected by different types of fading called asymmetric fading environment. In this paper we consider four different combinations of Rayleigh and Nakagami-m fading on 1st and 2nd hop to observe the profile of combined pdf (probability density function) and cdf (cumulative distribution function). With the help of cdf we determine the variation of outage probability of mixed fading. Finally we plot the SER (symbol error rate) against the SNR (signal to noise ratio) of the 2nd hop for all possible combinations of the two fading taking the SNR of 1st hop as a parameter. Although recent literature deals with asymmetric fading environment but in this paper instead of details statistical model of such fading we provide the relative scenario of mixed fading on 2-hop wireless link.
基金the Hi-Tech Research and Development Program of China(2006AAQIZ208);the Natural Science Foundation of Jiangsu Province(BK2QQ7236);the Six Trades Talent Highland Foundation of Jiangsu Province.
文摘In a traditional cellular system, the call requests initiated by mobile stations (MSs) must be carded through a base station (BS) via the cellular interface, but when MSs are located in the dead spots, their call requests will be blocked because the MSs cannot communicate with the BS. It is considered to relay these blocked calls requested using Ad-hoc network, which will improve the performance of the system as a whole. This article first introduces a novel architecture of the two-hop-relay cellular system in the dead spots, and then analyzes and compares the call blocking rate of the traditional cellular and the two-hop-relay cellular system respectively under three different conditions. The first and second conditions are the traditional cellular system without and with taking account of the effect of the dead spots. The third condition is the two-hop-relay cellular system with taking account of the effect of the dead spots. Numerical analytical result shows that the two-hop-relay cellular system can obtain lower call blocking rate than the traditional cellular system when considering the effect of dead spots. Consequently, this novel architecture can resolve the problem of coverage limitation of a traditional cellular system effectively.
基金the National Natural Science Foundation of China under Grant 61971190the Fundamental Research Funds for the Central Universities under Grant 2019MS089+2 种基金the Hebei Province Natural Science Foundation under Grant F2016502062 and Grant E2019502039the Beijing Natural Science Foundation under Grant 4164101the Key Project of Science and Technology Research in Higher Education of Hebei Province under Grant ZD2021406。
文摘Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious communication link by two full-duplex legitimate monitors(LMs)based on multi-agent deep deterministic policy gradient(MADDPG)algorithm in two phases.In phase 1,the suspicious transmitter sends information to the suspicious assistant relay,and the assistant relay decodes and forwards the received message to the suspicious receiver in phase 2.Meanwhile,two LMs cooperatively emit jamming to suspicious relay and receiver during each phase.Particularly,each LM is considered to be an energy-limited device,and eavesdropping is a long-term process,so we adopt expected eavesdropping energy efficiency(EEE)over a period of time to evaluate eavesdropping performance.However,for two LMs,how to cooperatively make jamming power decision at each hop in a dynamic environment is a huge challenge.Therefore,MADDPG algorithm,as a multi-agent reinforcement learning approach with the advantage of dynamic decision-making,is utilized to solve the issue of jamming power decision for each LM.In the simulation,the results show that our proposed cooperative jamming scheme can obtain higher expected EEE.
文摘To fully exploit the performance benefits of relay station (RS), in the two-hop cellular networks covering hotspots, when the number of RSs is predetermined, both RS deployment and frequency reuse scheme are jointly optimized for the purpose of maximizing the system capacity based on the constraints of system demand of capacity and the maximum number of outage demand nodes (MNDN). Further, considering the overhead of increasing RSs, it is desired to use minimum number of RSs. The joint RS deployment and frequency reuse scheme (JRDFR) problem is formulated into a mixed integer nonlinear programming, which is non-deterministic polynomial-time hard in general. A heuristic approach based on genetic algorithm is proposed to tackle the JRDFR problem. The computational experiment of the heuristic approach is achieved and optimized RS deployment and frequency reuse scheme is obtained. Finally, we discuss the impacts of MNDN and the number of RSs on the system performance.
文摘提出了一种基于邻居节点监听的虚假数据过滤策略(false reports filtering scheme based on neighbor watch,NWFFS).在NWFFS策略中,每个节点保存两跳邻居节点信息,每个数据包必须包含T个来自不同密钥分区节点的ID及其生成的MAC.除生成数据包的簇头节点外,每个中间节点向其下游节点转发数据包后,还需向自己的上游节点发送ACK包,通过对ACK包的监听,恶意节点利用其他区域俘获节点信息伪造的虚假数据包将被其一跳邻居识别出来,同时中间节点和Sink节点利用自身携带的密钥对少部分逃脱的虚假数据包进行进一步验证.理论分析和实验表明,该策略有效地避免了恶意节点利用任意区域已被其俘获的节点伪造虚假数据而不被识别出来,提高了途中过滤效率,从而降低了恶意节点对网络的影响,延长了网络生存期.
文摘描述了两跳MIMO(Multiple-input and Multiple-output)中继系统模型,概述了中继通用的转发策略以及系统性能分析常涉及到的信道模型和信源发射方案,详细介绍了两跳MIMO中继系统通信性能分析国内外的研究进展,通过一个具体的例子比较了不同发射策略系统的性能,最后探讨和展望了两跳MIMO中继系统下一步的研究方向。MIMO中继系统的性能分析为MIMO中继系统的工程应用提供了有价值的理论参考。