Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2019

Open Access 01.12.2019 | Research

Robust adaptive distributed beamforming for energy-efficient network flooding

verfasst von: Abdelrahman Abdelkader, Eduard Jorswieck

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2019

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a device-to-device wireless multi-hop communication scenario with resource-constrained devices, the energy efficiency of communication plays a significant role in network design and operation. Based on the recently proposed Glossy network flooding approach, we introduce cooperation between transmitting nodes and formulate a robust multicast beamforming problem with imperfect channel state information (CSI) and analyze its performance. The level of cooperation is dependent on the number of limited feedback bits from receivers to transmitters. First, the impact of the number of limited feedback bits B on energy efficiency is studied, and the programming problem for finding the optimal B is formulated subject to a maximum outage constraint of 5%. Numerical simulations show that there exists an optimal number of feedback bits that maximizes energy efficiency. Second, the effect of the number of cooperating transmitters on energy efficiency is investigated. Results show that an optimum group of cooperating transmit nodes, also known as a transmit coalition, can be formed in order to maximize energy efficiency. Results show that the investigated techniques including optimum feedback bits and transmit coalition formation can achieve a 100% increase in energy efficiency when compared to the state-of-the-art Glossy under the same operation requirements in very dense networks.
Abkürzungen
CSI
Channel state information
CQI
Channel quality information
DCBF
Distributed collaborative beamforming
D2D
Device-to-device
FOS
Flooding overlay structure
GCF
Greedy coalition formation
IoT
Internet of Things
LR-WPANs
Low-rate wireless personal access networks
MMSE
Minimum mean square error
MTC
Machine-type communication
QoS
Quality of service
SIC
Successive interference cancelation

1 Introduction

Vastly distributed sensors are becoming an important part of our daily lives where they are utilized in many applications and diverse fields such as smart homes, environmental monitoring, emergency, and health [1, 2]. Furthermore, recent 5G initiatives show a clear focus on energy-efficient smart cooperative transmission protocols [3]. These initiatives are partially motivated by the importance of energy efficiency in large-scale wireless networks for the Internet of Things (IoT) and cyber-physical systems applications [4]. The devices used in these applications are usually heavily distributed, which makes them very challenging to be replaced or recharged in a frequent manner. Therefore, extending their battery life becomes crucial. Optimizing energy will help extend the expected lifetime of these small battery-operated devices and facilitate their large-scale deployment.
To this end, we extend our development in [5] where a device-to-device wireless multi-hop communication scenario with resource-constrained devices that require energy-efficient connectivity is considered. Based on the recently proposed Glossy network flooding protocol [6], that follows the IEEE 802.15.4 low-rate wireless personal area networks (LR-WPANs) standard, the beamforming and power control problem is formulated, analyzed, and assessed in network scenarios where the same information needs to be shared with all nodes. Performance measures are compared, where the use of beamforming has proven to improve energy efficiency significantly.
In this work, we move towards a more realistic scenario where the cost of cooperation in terms of energy consumption is taken into account. This cost of cooperation is represented by the energy consumed in the process of channel state information (CSI) feedback from receiving to transmitting nodes. We note that there are several other factors that contribute to the processing overhead of collaborative distributed multicast beamforming [7] in actual implementations, but for the scope of this paper, we focus on the theoretical analysis of the proposed approach. We leave the physical implementation impairments for future research. This results in a trade-off between implementation complexity and energy efficiency [8]. Moreover, we analyze the consequence of changing the number of cooperating nodes on energy efficiency. We use the term coalition throughout the paper to address a number of transmitters that cooperate in order to perform multicast beamforming during any intermediate stage of a Glossy flood. We describe and analyze the performance of an algorithm that maximizes energy efficiency in cooperative network flooding by forming coalitions of transmit nodes.
After describing the system model in Section 2.1, we explain the proposed CSI feedback approach in Section 2.2, then we introduce our problem statement in Section 2.3. Following that, we formulate in Section 3 our general robust multicast beamforming problem under limited feedback, building therefore upon the results presented in [5]. Then, we analyze the effect of increasing feedback bits B and optimal coalition size to maximize energy efficiency in Sections 4 and 5, respectively. We support this analysis with simulation results presented and discussed in Section 6, where we illustrate how the robust beamforming problem can be solved for application-specific requirements. Finally, we present our conclusions and an agenda for future works in Section 7. A list of regularly used abbreviations throughout the paper is shown in Table 1.
Table 1
List of abbreviations
CSI
channel state information
IoT
internet of things
LR-WPANs
low rate wireless personal access networks
MTC
machine type communication
D2D
device to device
DCBF
distributed collaborative beamforming
FOS
flooding overlay structure
MMSE
minimum mean square error
SIC
successive interference cancellation
CQI
channel quality information
QoS
quality of service
GCF
greedy coalition formation

1.1 Recent results on cooperation and beamforming in wireless sensor networks

Cooperation in wireless networks is a topic that has attracted the attention of researchers for many years [912]. Distributed and collaborative beamforming is defined as a technique where independent and randomly located source nodes cooperate to transmit a common radio frequency signal, hence forming a virtual antenna array [13]. This cooperation improves the lifetime of the sensor nodes [14], proving to be valuable for systems with limited battery life. It also shines as a promising technique to empower many 5G technologies such as machine-type communication (MTC), device-to-device communication (D2D), and Internet of Things (IoT).
Initially, research on collaborative distributed beamforming in sensor networks was divided into two directions [15]: collaborative and distributed. On the one hand, collaborative beamforming focused on beam pattern analysis while assuming a perfect phase and carrier synchronization between sensor nodes [16]. On the other hand, distributed beamforming focused on the feasibility of achieving synchronization between those nodes [17]. However, some work was done in order to explore the possibility of achieving cooperation without synchronization such as in [18]. Later on, both directions started merging forming distributed collaborative beamforming. The recent survey [15] classifies research trends in this area very clearly, from which Fig. 1 is adapted. This classification indicates that our current work, where we maximize energy efficiency in network flooding by applying distributed collaborative beamforming (DCBF), lies within the scope of power minimization and lifetime maximization, more precisely under energy efficiency maximization.
Previous research efforts in this direction have several performance metrics for the evaluation of DCBF. Network lifetime is usually defined as the time duration from the start of network operations till the first node runs out of battery [14]. In [19], a power allocation algorithm using convex optimization is used to maximize network lifetime. On the other hand, total power consumption is defined as the sum of the total consumed power of each node in transmit, receive, and idle phases of operation [6]. In some works, e.g., [14], only transmit power is considered in the total power consumption. In [20], an algorithm using a dual problem convex optimization is proposed to minimize the total power consumption under individual power constraints. Another approach by [14] using genetic algorithm is proposed to minimize the transmit power consumption and increase the network lifetime. Moreover, maximizing energy efficieny is the goal of [21] where sequential quadratic programming is used to solve the problem of optimal node allocation; they also show the effects on spectral efficiency. Robust distributed beamforming is considered in [22], where beamforming is used to minimize the total relay transmit power under signal-to-noise ratio constraints with the availability of perfect channel state information. An effort to investigate distributed beamforming under limited feedback in cooperative networks is made in [23], where an optimal beamforming vector is proposed to maximize the received signal-to-noise ratio at the receiver. Although only a fixed number of feedback bits is considered, the results prove that this scheme is indeed beneficial in terms of performance.

1.2 Network flooding state of the art

Network flooding (also commonly known as data dissemination) is used in many applications ranging from environmental monitoring to industrial automation. For many of these applications, the main research focus is reliability and energy efficiency because of the limited battery lifetime of the sensor nodes. Many network flooding approaches are presented in the literature over the years. The simplest form of it is called Simple Flooding, where each node that receives a new message forwards it to a neighbor node. However, this results in excessive redundancy and network congestion [24]. A method to treat this problem is presented in [25], where a flooding overlay structure (FOS) is proposed to increase the network lifetime and reduce the overhead of flooding in a sensor network. Another example is Trickle, a network flooding algorithm for code propagation in wireless sensor networks [26]. Trickle uses an individual timer at each node to periodically send out a summary to the neighboring nodes but obligates the node to stay silent in case of receiving information similar to its own. Unfortunately, Trickle is not suitable for real-time applications due to the long time until stable operation which can go up to a few minutes. For real-time applications, Glossy is introduced in [6] to exploit constructive interference at the receiving nodes resulting from concurrent transmissions of identical packets form multiple nodes. For the successful use of concurrent transmissions, a high level of synchronization is needed, which is provided by Glossy down to 0.5 μs for an eight-hop network. On top of a very simple algorithm, Glossy achieves very high reliability with low latency. However, scheduling individual floods for each source node can cause a delay until all data is disseminated successfully. To remedy this, MF-Glossy is proposed in [27], where physical layer network coding enables multiple simultaneous floods in Glossy. The results show increased energy efficiency and goodput when compared to the standard Glossy on the expense of a complicated receiver design.
A Glossy flood typically starts with one node transmitting certain information at maximum transmit power (0 dbm). Then, all nodes, which receive successfully and have not reached the limit on number of transmissions, transmit concurrently the received information with maximum transmit power. This continues until no more nodes are able to transmit due to the transmission limit. The result of this procedure is waves of the same information propagating back and forth through the network until the Glossy flood is terminated. This simple yet effective operation primitive is the reason why we try to make Glossy more energy efficient through cooperation and robust multicast beamforming while studying its impact on performance.

2 Preliminaries

Before starting our problem formulation, we explain the system model used throughout this work to build our optimization problem and coalition formation algorithm.

2.1 System model

Our approach can be viewed as an adaptive transmit diversity scheme. The transmission protocol starts, as in standard Glossy, with one node initiating the flood. This initial phase is a simple multicast transmission where one node transmits a message, and the nodes within a reception range receive it. After a successful reception of the message by, let us say, K nodes, these nodes become transmitters in the next round. In standard Glossy, all K nodes proceed to transmit the same information simultaneously in a non-cooperative way. Here, we propose to define K1K of cooperating nodes which acquire CSI from the receiver through limited feedback, in order to perform multicast beamforming. The remaining K2=KK1 nodes do not cooperate and operate in standard Glossy. Please note that K1= is standard Glossy. An example of the system model is shown in Fig. 2, where K=5 nodes, which have successfully received and decoded the message from the last transmission, send the same data x to L=3 receiving nodes. First, CSI is fed back from the receivers to the transmitters through a limited feedback channel as shown in Fig. 2 using random vector quantization as thoroughly explained in Section 2.2. Then, each transmitting node constructs an estimated channel matrix H using the acquired feedback and proceeds to calculate an energy-efficient coalition to which all or subset of the K nodes (K1 nodes) can participate. The formation of this coalition is based on a greedy approach that can be executed at each transmitting node independently. This is explained in more details in Section 5. Afterwards, the information is divided into K=5 symbols where the first three symbols [x1,x2,x3] are cooperatively transmitted by K1 nodes one to three, while symbols x4 and x5 are transmitted by K2 nodes four and five, respectively. The coalition of the three nodes solves an energy efficiency optimization problem that will be formulated and discussed in Section 3 and cooperatively transmits the information forming a virtual antenna array that uses energy-efficient robust beamforming by applying the precoding matrix W, while the remaining two nodes operate in standard Glossy mode and transmit using maximum power p. The received signal at any receiver l can be characterized as follows:
$$ y_{l} =\boldsymbol{x}^{T}\boldsymbol{U} \boldsymbol{h}_{l} + z_{l} $$
(1)
where cooperation is controlled by the K ×K matrix \( \boldsymbol {U}= \text {blockdiag }(\boldsymbol {W}, \sqrt {p}\boldsymbol {I})\), xT=[x1...x5] are the data symbols, W is the K1xK1 beamforming matrix, \(\boldsymbol {h}_{l}^{T} = [h_{1l},... h_{5l}]\) is the channel vector between receiver l and the transmitting nodes, and zl is the receiver noise. The [ ]T describes the transpose operation. After the signal reception, interference cancelation methods (i.e., minimum mean square error (MMSE) and successive interference cancelation (SIC)) are applied at each receiving node before the original message x can be retrieved. The maximum rate achieved by applying such processing at any receiver node l to the received signals can then be calculated as follows:
$$ {} R_{l}^{*} \,=\, \log \left(1\,+\,\frac{\left|\boldsymbol{x}^{T}\boldsymbol{U}\boldsymbol{h}_{l}\right|^{2}}{{\sigma_{l}^{2}}}\right) \,=\, \log \left(1\,+\, \frac{\boldsymbol{h}_{l}^{H} \boldsymbol{U}^{H} E\left[\boldsymbol{x}^{*} \boldsymbol{x}^{T}\right] \boldsymbol{U} \boldsymbol{h}_{l}}{{\sigma_{l}^{2}}}\right) $$
(2)
where E[ ] is the expectation operation, and E[xxT] is the transmit covariance matrix as shown in [28]. By applying MMSE and SIC techniques as demonstrated in ([29], ch. 10), it can be equivalently described as:
$$ {\begin{aligned} R_{l}^{*} \,=\, \log \left(1+ \frac{ \left[\begin{array}{l}h_{1l}\\h_{2l}\\h_{3l}\\ \end{array}\right]^{H} \boldsymbol{W}^{H} \boldsymbol{C_{3}} \boldsymbol{W} \left[\begin{array}{l}h_{1l}\\h_{2l}\\h_{3l}\\ \end{array}\right]}{{\sigma_{l}^{2}}} \,+\, \frac{|h_{l4}|^{2} E \left[|x_{4}|^{2}\right]}{{\sigma_{l}^{2}}} \,+\, \frac{|h_{l5}|^{2} E \left[|x_{5}|^{2} \right]}{{\sigma_{l}^{2}}}\right) \end{aligned}} $$
(3)
where hil is the channel coefficient from transmitter i to receiver l, C3 is the covariance matrix of data in the cooperating transmitters and is equal to the identity matrix I, the [ ] and [ ]H describe the conjugate and conjugate transpose operations, respectively. Using the definition of Gram matrix ([30], p. 55), we can rewrite the achievable rate equation as follows:
$$ {} R_{l}^{*} = \log \left(1+ \frac{\left[\begin{array}{l}h_{1l}\\h_{2l}\\h_{3l}\\ \end{array}\right]^{H} \boldsymbol{G} \left[\begin{array}{l}h_{1l}\\h_{2l}\\h_{3l}\\ \end{array}\right]}{{\sigma_{l}^{2}}} + \frac{|h_{l4}|^{2} p}{{\sigma_{l}^{2}}} + \frac{|h_{l5}|^{2} p}{{\sigma_{l}^{2}}}\right) $$
(4)
where
$$ \boldsymbol{G}= \boldsymbol{W}^{H}\boldsymbol{W} $$
(5)
is a positive semi-definite matrix. This can be generalized to the case of K=K1+K2 transmitters with K1 cooperating nodes and K2 non-cooperating nodes as follows:
$$ R_{l}^{*} = \log \left(1+ \frac{\boldsymbol{h}_{l} \boldsymbol{G} \boldsymbol{h}_{l}^{H} }{{\sigma_{l}^{2}}} + \sum_{i =K_{1}+1}^{K}\frac{|h_{{il}}|^{2} p}{{\sigma_{l}^{2}}}\right) $$
(6)
where \(\boldsymbol {h}_{l}^{T} = [h_{1},h_{2}... h_{K_{1}}]\), G is a K1×K1 positive semi-definite matrix, and p is the maximum transmit power of the node. Moreover, for the case where all transmitting nodes are cooperating, the maximum achievable rate can be described as:
$$ R_{l}^{*} = \log \left(1+ \frac{\boldsymbol{h}_{l} \boldsymbol{G} \boldsymbol{h}_{l}^{H} }{{\sigma_{l}^{2}}}\right) $$
(7)
with K ×K positive semi-definite matrix G.

2.1.1 Channel model

In order to examine the effect of limited feedback on a complex communication scenario such as Glossy, we must specify our channel characteristics. We start with the signal received at receiver l, described in (1). Channel vectors of receivers 1 to L with \(\mathbf {h}_{l}^{T} = [h_{1l}, h_{2l},....h_{{Kl}}]\) and \(h_{{kl}} \in \mathbb {C}\) is the channel gain from transmitter k to receiver l modeled as quasi-static, independent, and experience flat-fading on the block length, which is a valid assumption for low-power wireless devices such as Zigbee ([31], E 5.3). These coefficients are calculated according to hkl=wklgkl, where small-scale fading wkl follows a complex normal distribution \(\mathcal {CN}(0,1)\), and large-scale fading gkl depends on the distance dkl between transmitter k and receiver l ([31], E 5.3) as follows:
$$ g_{{kl}} = \left\{ \begin{array}{ll} 40.2+20 \log(d_{{kl}}) &, d_{{kl}} \leq 8~{\,\mathrm{m}}\\ 58.5+33 \log({d{kl}/8}) &,d_{{kl}} > 8~{\,\mathrm{m}} \end{array} \right. $$
(8)
which corresponds to a path loss exponent of 2 for the first 8 m and a path loss exponent of 3.3 for distances larger than 8 m. To ensure gkl>0 according to (8), we consider only the topologies where the distance between any pair of nodes exceeds 0.1 m, which is reasonable in real deployments [32]. We denote the normalized channel vector \(\tilde {\mathbf {h}_{l}} = \frac {\mathbf {h}_{l}}{||\mathbf {h}_{l}||}\), where \(\tilde {\mathbf {h}_{l}}\) is a unit vector that describes only the channel direction. Moreover, in our model, transmitters are assumed to know the channel quality information (CQI), represented by ||hl||, perfectly, while each receiver l is assumed to know local CSI hl through pilot training [33, 34] at the beginning of transmission which is not the focus of this work. CSI is then quantized and shared with transmitting nodes through a limited feedback channel as described in Section 2.2. Finally, zl is the additive white Gaussian noise with a complex normal distribution \(z_{l} \sim \mathcal {CN}(0,{\sigma _{l}^{2}})\).

2.2 CSI feedback

Quantization is done using randomly generated vector quantization codebooks independently at each receiver. A codebook \(\mathcal {C}\) contains 2BK-dimensional unit norm vectors randomly drawn from the isotropic distribution on the K-dimensional unit sphere where \(\mathcal {C} \overset {\Delta }{=} \{\mathbf {c}_{1},\mathbf {c}_{2},....\mathbf {c}_{2^{B}} \} \). In addition to being mathematically tractable, random vector quantization (RVQ) performs close to optimal quantization as feedback bits B [35]. This can be independently applied at each receiver l where the closest vector ci to the normalized real channel \(\tilde {\mathbf {h}_{l}}\) is chosen. The index i is then broadcasted to active transmitters using B feedback bits. The RVQ process is performed such that the closest vector ci to the normalized real channel \(\tilde {\mathbf {h}_{l}}\) has to be chosen. We consider the Euclidean distance, defined as the norm of the difference between ci and \(\tilde {\mathbf {h}_{l}}\), as a measure of closeness. Each receiver must choose the closest vector ci to the normalized channel \(\tilde {\mathbf {h}_{l}}\) independently. This is done by solving the following problem:
$$ \begin{aligned} & i_{l} = \text{arg} & & \min\limits_{1 \leq i \leq 2^{B}} ||\tilde{\mathbf{h}_{l}}- \mathbf{c}_{i}||^{2}\\ \end{aligned} $$
(9)
Since the norm of the error vector is:
$$ \begin{aligned} & ||\delta_{l}||^{2} & & = ||\tilde{\mathbf{h}_{l}}-\hat{\mathbf{h}_{l}} ||^{2}\\ \end{aligned} $$
(10)
where the \(\hat {\mathbf {h}_{l}}\) is the quantized channel vector based on the Euclidean distance, this manner of choosing the quantized channel vector results in the minimum error norm possible. Unfortunately, the statistical behavior of this error is not available in closed form.

2.2.1 Feedback overhead

Feedback is the operation of sharing quantized CSI between receivers and transmitters. Each receiver node l must quantize and share its CSI using the feedback channel. Thanks to the broadcast nature of the wireless medium and assuming error-free feedback channels, it is safe to assume that any wireless signal received successfully by the furthest node, can be received by all other nodes, and the power needed for reliable transmission is at least:
$$ P_{l} = (2^{B}-1) \max\limits_{1 \leq j \leq K, j \neq l} |d_{{lj}}|^{2} $$
(11)
where dlj is the distance from receiver l to transmitter j, operator |.| denotes the Euclidean norm, and Pl is defined as the transmission power needed to distribute CSI from receiver l to all transmitters. The total feedback energy overhead is computed as follows:
$$ P_{\text{coop}} = (2^{B}-1) \sum\limits_{l=1}^{L} \max\limits_{1 \leq j \leq K, j \neq l} |d_{{lj}}|^{2} $$
(12)
where we can see the exponential dependency of Pcoop on the number of feedback bits B and linear dependency on the distances between receivers and transmitters. This means that increasing the number of feedback bits B will result in a higher cooperation over head in terms of Pcoop but will also result in a more accurate estimation of the channels, leading to less transmit power. Therefore, there must be an optimum number of feedback bits B that minimizes the total energy consumption and maximizes energy efficiency. This brings us to our problem statement, which we present in Section 2.3.

2.3 Problem statement

In order to efficiently manage the network resources and achieve high energy efficiency in the state-of-the-art Glossy [36, 37], we seek to analyze the feasibility of using power control and transmission cooperation schemes such as coherent multicast beamforming. To achieve our goal, we first look at the problem of limited feedback, where receiving nodes try to share their CSI with transmitting nodes using B feedback bits. Increasing the number of feedback bits B used in CSI sharing results in a better representation of the channels and lower quantization error. However, the consumed energy overhead by reliably transmitting these feedback bits increases as well. This results in a clear trade-off between the cooperation gain achieved by coherent multicast beamforming among the K transmitting nodes and the consumed energy overhead due to CSI feedback. Therefore, there must exist an optimal B, dependent on network parameters such as topology, number of transmitters K, and density of the network, that maximizes energy efficiency. This allows us to solve a programming problem, that depends on the CSI uncertainty parameter εl, and in turn optimal B, that maximizes energy efficiency under quality of service constraints (QoS) and guarantees successful reception as follows:
$$ {{} \begin{aligned} &\min\limits_{\boldsymbol{G}} & &{tr}\,\left({\boldsymbol{G}}\right) \end{aligned}} $$
(13)
$$ {{} \begin{aligned} & \text{subject to} & &\!\!\!\!\!\!\!\left(\hat{\mathbf{h}_{l}} \,+\, \mathbf{\delta}\right) \boldsymbol{G}\left(\hat{\mathbf{h}_{l}} \,+\, \mathbf{\delta}\right)^{H} \geq \frac{\left(2^{R}-1\right){{\sigma_{l}^{2}}}}{||\mathbf{h}_{l}||^{2}} ~;~\forall l \in \mathcal{L}~, \end{aligned}} $$
(14)
$$ {\begin{aligned} &&&\forall \mathbf{\delta} : ||\mathbf{\delta}||\leq \epsilon,\\ \end{aligned}} $$
(15)
$$ {\begin{aligned} &&&\boldsymbol{G}\succeq 0. \end{aligned}} $$
(16)
where all transmitters are assumed to be cooperating and minimizing the beamforming transmit powers tr (G) and the feedback power under three inequality constraints. Inequality (14) ensures the achievable rate robustness against CSI uncertainty, inequality (15) limits the maximum CSI uncertainty error, and inequality (16) insures that cooperation multicast beamforming covariance matrix G is positive semi-definite. This programming problem results in maximizing the energy efficiency and is solved and discussed in more details in Sections 3 and 4. Lastly, we look at the problem of choosing cooperating nodes. We investigate how the choice of cooperating transmitters K1 affects energy efficiency, whether there exists an optimum coalition and how to form it.

3 Transmit beamforming optimization under limited feedback

In our previous work [5], we considered the case of multicast beamforming under the assumption of perfect CSI available at both transmitter and receiver. The following programming problem was solved for the optimal precoder G:
$$ \begin{aligned} &\min\limits_{\boldsymbol{G}} & &{tr}\,\left({\boldsymbol{G}}\right) \\ & \text{subject to} & & \mathbf{h}_{l} \boldsymbol{G} \mathbf{h}_{l}^{H} \geq \left(2^{R}-1\right){{\sigma_{l}^{2}}}; ~\forall l \in \mathcal{L} \\ & & & \boldsymbol{G}\succeq 0 \end{aligned} $$
(17)
where the inequality G≽0 means that G is a positive semi-definite matrix. The programming problem in (17) is a convex problem with a linear objective function, convex constraint set, and is formulated as explained in [9]. To solve it, we use CVX, a MATLAB package for solving convex programs [38, 39].
Unfortunately perfect CSI knowledge at the transmitter side is not always possible as in this work, where limited feedback is considered. Therefore, based on the available CSI provided to the transmitters through limited feedback and using the uncertainty model explained in Section 2.2, the transmitter has to estimate the real channels in order to calculate the appropriate beamformer. First, in order to satisfy the QoS constraints at each receiver l, the following must hold:
$$ \log\left(1+ \frac{\mathbf{h}_{l} \boldsymbol{G} \mathbf{h}_{l}^{H}}{{{\sigma_{l}^{2}}}} \right) \geq R ~ ; ~\forall l \in \mathcal{L} $$
(18)
The real channel hl can be written in terms of the quantized channel direction \(\hat {\mathbf {h}_{l}}\) and the channel norm ||hl|| as such:
$$ \mathbf{h}_{l} = ||\mathbf{h}_{l}||\tilde{\mathbf{h}_{l}} = ||\mathbf{h}_{l}|| \left(\hat{\mathbf{h}_{l}} + \mathbf{\delta}_{l}\right) $$
(19)
We assume that both \(\hat {\mathbf {h}_{l}}\) and ||hl|| are known by the transmitter. Therefore, after some algebraic manipulations, (18) can be written as:
$$ \begin{aligned} & \left(\hat{\mathbf{h}_{l}} + \mathbf{\delta}_{l}\right) \boldsymbol{G}\left(\hat{\mathbf{h}_{l}} + \mathbf{\delta}_{l}\right)^{H} \geq \frac{(2^{R}-1){{\sigma_{l}^{2}}}}{||\mathbf{h}_{l}||^{2}} ~;\\ & ~\forall l \in \mathcal{L}~, ~ \forall \mathbf{\delta}_{l} : ||\mathbf{\delta}_{l}||\leq \epsilon_{l} \end{aligned} $$
(20)
where εl is an upper bound on the norm of quantization error. In order to design a beamformer that is robust against quantization error, the transmitters must minimize the transmit power while satisfying the rate constraints in (20). Using (20) and (17), the robust beamforming optimization problem can be formulated as in (13).
Since the quantization error vector δl is random and exact knowledge of its direction is not available at the transmitter, we modify the optimization problem mathematically so it can be solved numerically. To that purpose, we apply some simplification and algebraic modifications to the constraints in (20) similar to the analysis done in [40]. The robust beamforming optimization problem in (13) becomes equivalent to the following semi-definite programming problem which can be solved by a MATLAB tool for convex optimization known as CVX [38, 39]:
$$ \begin{aligned} &\min\limits_{\boldsymbol{G}\boldsymbol{Q},\mu} & &{tr}\,\left({\boldsymbol{G}}\right) \\ & \text{subject to} & &\hat{\mathbf{h}_{l}} \left(\boldsymbol{G}- \boldsymbol{Q}\right) \hat{\mathbf{h}_{l}}^{H} - {\epsilon_{l}^{2}} \mu \geq \frac{(2^{R}-1){{\sigma_{l}^{2}}}}{||\mathbf{h}_{l}||^{2}} ~; \\ & & & ~\forall l \in \mathcal{L}~, ~ \mu \geq 0~,~\boldsymbol{G} \succeq 0\\ & & & \left[\begin{array}{cc} \boldsymbol{Q} & \boldsymbol{G}\\ \boldsymbol{G} & \boldsymbol{G}+\mu \boldsymbol{I}\\ \end{array}\right] \geq 0\\ \end{aligned} $$
(21)
Based on S-procedure and Schur complement as explained in Appendix A and B, respectively, we first transform the rate constraints in (20) as:
$$ \begin{aligned} & \mathbf{\delta_{l}} \boldsymbol{G} \mathbf{\delta}_{l}^{H} + 2\hat{\mathbf{h}_{l} \boldsymbol{G} \mathbf{\delta}_{l}^{H}} + \hat{\mathbf{h}_{l}} \boldsymbol{G} \hat{\mathbf{h}_{l}}^{H} -z \geq 0 ~;\\ & ~\forall l \in \mathcal{L}~, ~ \forall \mathbf{\delta}_{l} : -||\mathbf{\delta}_{l}||^{2} + {\epsilon_{l}^{2}} \geq 0 \end{aligned} $$
(22)
where \( z = \frac {\left (2^{R}-1\right){{\sigma _{l}^{2}}}}{||\mathbf {h}_{l}||^{2}}\), and ||δ||2=δHδ. According to S-procedure, this holds if and only if there exists μ≥0 such that:
$$ \left[\begin{array}{cc} \boldsymbol{G}+\mu \boldsymbol{I} & \boldsymbol{G} \tilde{\mathbf{h}_{l}}\\ \tilde{\mathbf{h}_{l}} \boldsymbol{G} & \tilde{\mathbf{h}_{l}}\boldsymbol{G}\tilde{\mathbf{h}_{l}}^{H} - {\epsilon_{l}^{2}} \mu - z\\ \end{array}\right] \succeq 0, $$
(23)
This provides us with two separate cases for μ. First, we examine the case where μ>0. Using Schur complement, (23) can be written as:
$$ \begin{aligned} &\tilde{\mathbf{h}_{l}}\boldsymbol{G}\tilde{\mathbf{h}_{l}}^{H} - {\epsilon_{l}^{2}} \mu - z - \tilde{\mathbf{h}_{l}} \boldsymbol{G} \left[\boldsymbol{G}+\mu \boldsymbol{I} \right]^{-1} \boldsymbol{G} \tilde{\mathbf{h}_{l}}^{H} \geq 0\\ & \tilde{\mathbf{h}_{l}}\boldsymbol{G}\tilde{\mathbf{h}_{l}}^{H} - \tilde{\mathbf{h}_{l}} \boldsymbol{G} \left[\boldsymbol{G}+\mu \boldsymbol{I} \right]^{-1} \boldsymbol{G} \tilde{\mathbf{h}_{l}}^{H} - {\epsilon_{l}^{2}} \mu \geq z\\ \end{aligned} $$
(24)
Second, we introduce Q, where Q≽[G+μI]−1G. The robust beamforming optimization problem in (13) can be rewritten as:
$$ \begin{aligned} &\min\limits_{\boldsymbol{G}\boldsymbol{Q},\mu} & &{tr}\,\left({\boldsymbol{G}}\right) \\ & \text{subject to} & &\hat{\mathbf{h}_{l}} \boldsymbol{G} \hat{\mathbf{h}_{l}}^{H} - \hat{\mathbf{h}_{l}} \boldsymbol{Q} \hat{\mathbf{h}_{l}}^{H} - {\epsilon_{l}^{2}} \mu \geq \frac{\left(2^{R}-1\right){{\sigma_{l}^{2}}}}{||\mathbf{h}_{l}||^{2}} ~;\\ & & & ~\forall l \in \mathcal{L}~, ~ \mu > 0~,~\boldsymbol{G} \succeq 0\\ & & & \boldsymbol{Q}- \left[ \boldsymbol{G}+\mu \boldsymbol{I} \right]^{-1} \boldsymbol{G} \succeq 0 \end{aligned} $$
(25)
By applying Schur complement to the constraint in (25), it can be transformed equivalently into:
$$ \begin{aligned} &\min\limits_{\boldsymbol{G}\boldsymbol{Q},\mu} & &{tr}\,\left({\boldsymbol{G}}\right) \\ & \text{subject to} & &\hat{\mathbf{h}_{l}} \left(\boldsymbol{G}- \boldsymbol{Q}\right) \hat{\mathbf{h}_{l}}^{H} - {\epsilon_{l}^{2}} \mu \geq \frac{(2^{R}-1){{\sigma_{l}^{2}}}}{||\mathbf{h}_{l}||^{2}} ~; \\ & & & ~\forall l \in \mathcal{L}~, ~ \mu > 0~,~\boldsymbol{G} \succeq 0\\ & & & \left[\begin{array}{cc} \boldsymbol{Q} & \boldsymbol{G}\\ \boldsymbol{G} & \boldsymbol{G}+\mu \boldsymbol{I}\\ \end{array}\right] \geq 0\\ \end{aligned} $$
(26)
Second, for μ=0, (23) amounts to:
$$ \left[\begin{array}{cc} \boldsymbol{G} & \boldsymbol{G} \tilde{\mathbf{h}_{l}}\\ \tilde{\mathbf{h}_{l}} \boldsymbol{G} & \tilde{\mathbf{h}_{l}}\boldsymbol{G}\tilde{\mathbf{h}_{l}}^{H} - z\\ \end{array}\right] \succeq 0 $$
(27)
and equivalently
$$ \left[\begin{array}{ll} -\tilde{\mathbf{h}_{l}}^{H} & 1 \end{array}\right] \left[\begin{array}{cc} \boldsymbol{G} & \boldsymbol{G} \tilde{\mathbf{h}_{l}}\\ \tilde{\mathbf{h}_{l}} \boldsymbol{G} & \tilde{\mathbf{h}_{l}}\boldsymbol{G}\tilde{\mathbf{h}_{l}}^{H} - z\\ \end{array}\right] \left[\begin{array}{l} -\tilde{\mathbf{h}_{l}}\\ 1 \end{array}\right] = -z \geq 0 $$
(28)
which means that the constraints in (26) can be satisfied for the case of μ=0 by having Q=G and can hereby be included into (26), arriving to the final result in (21). Algorithm 1 shows the operations done at each transmitting node after receiving the feedback signal.
https://static-content.springer.com/image/art%3A10.1186%2Fs13638-019-1434-0/MediaObjects/13638_2019_1434_Figa_HTML.png
https://static-content.springer.com/image/art%3A10.1186%2Fs13638-019-1434-0/MediaObjects/13638_2019_1434_Figb_HTML.png

4 Maximizing energy efficiency through feedback optimization

First, we evaluate the effect that the number of feedback bits B has on energy efficiency of an arbitrary single hop within a Glossy flood. This is the first step towards optimizing the number of feedback bits B from an energy efficiency point of view. To do so, we must define our performance measures. So, we begin by defining energy efficiency as introduced in [41] as follows:
$$ EE = \frac{\text{Goodput}}{\text{Total energy consumption}} $$
(29)
where, in our scenario, the average rate is defined, similar to the formulation in [42], as the average successfully received rate at each receiver, and the total energy consumption is the sum of transmit energies for all K transmitters and the cooperation overhead Pcoop as defined in (12). The energy efficiency can be rewritten as such:
$$ EE = \frac{(1-\Pr_{o})R}{{tr}\,\left({\boldsymbol{G}}\right)+ P_{\text{coop}}} $$
(30)
where Pro is the outage probability fixed to an application specific minimum acceptable value, and R is the source rate fixed at 250 kbps as in the IEEE 802.15.4 standard [31].
In order to maximize energy efficiency, we need to consider the following optimization problem:
$$ \begin{aligned} && \max\limits_{B(\epsilon)} & & EE = \frac{(1-\Pr_{o})R}{{tr}\,\left({\boldsymbol{G}}\right)+ P_{\text{coop}}} \\ \end{aligned} $$
(31)
Due to the fixed nominator, this problem is equivalent to:
$$ \begin{aligned} &\min\limits_{B(\epsilon)} & &{tr}\,\left({\boldsymbol{G}}\right)+\left(2^{B(\epsilon)}-1\right) \max\limits_{1 \leq j \leq K, j \neq l} |d_{{lj}}|^{2}\\ \end{aligned} $$
(32)
Unfortunately, due to the lack of a closed form expression for B in terms of ε, this optimization problem can not be simultaneously solved for G and B. Therefore, an offline database created using network statistics is saved at each node, where ε can be chosen as a function of K,B, and Pro. An example of the offline database is shown in Fig. 3 for Pro=5%. After that, the programming problem in (32) can be solved independently at each receiver node for each B in order to find B that achieves the minimum consumed energy for the application specific Pro requirement. The feedback generation algorithm in Algorithm 2 shows the operational steps carried out at each receiver node, while the flow chart in Fig. 4 shows the protocol operations flow at each node.
A simple example can be seen in Fig. 5 with four transmitting nodes waiting for receiver feedback and three receiving nodes executing Algorithm 2. Due to different positions, each receiver will have a relation between consumed energy and B. The dependency of consumed energy on the number of feedback bits B for each receiver is calculated and shown in Fig. 6. We can see there that it is possible that B would be different for each receiver depending on its position in the network. In our example, receivers 1, 2, and 3 will choose 2, 3, and 5 bits, respectively, for feedback transmission.
Error Database Example. An example of the offline database saved at each node where ε can be chosen as a function of K, B, and Pro. In this example, Pro is set to 5%

5 Coalition formation

The proposed enhancements of the Glossy approach are divided into two parts. The first part is a feedback generation at receiving nodes, followed by multicast beamforming at transmitting nodes as explained in Sections 3 and 4, respectively. The second part is a coalition formation strategy that chooses cooperating transmitters in order to maximize energy efficiency. In this section, we analyze the effect of coalition size and participant transmitters on energy efficiency and if there exists an optimal choice of cooperating nodes that maximizes energy efficiency.
For this part, we allow a subset of all transmitting nodes to cooperate. Our goal is to show the possibility that a certain cooperating group of transmitters (coalition) exists to maximize energy efficiency. It is important to note that this study is to show the effectiveness of coalition formation and not to demonstrate how it can be implemented in a distributed fashion. First, feedback operation is performed as explained in Section 2.2, where the receivers provide the CSI to the K transmitters. In order to minimize the energy consumed in the cooperation phase, the transmitter furthest away from all receivers is removed from the coalition. If this elimination operation improves the energy efficiency of the transmission, the next furthest away transmitter is removed. Elimination stops when the energy efficiency starts to deteriorate and the coalition is returned to the last step. This greedy transmitter selection operation is explained in Algorithm 3.
https://static-content.springer.com/image/art%3A10.1186%2Fs13638-019-1434-0/MediaObjects/13638_2019_1434_Figc_HTML.png
This operation results in a coalition of K or less transmitters. The effect of this enhancement on energy efficiency and energy consumption compared to both normal Glossy and Glossy with transmit beamforming will be demonstrated in Section 6.

6 Results and discussion

We evaluate the performance of the proposed approach in two different cases. First, we consider an intermediate stage in a Glossy flood with K transmitters and L receivers. This case is considered for Fig. 7. Second, we consider a complete Glossy flood in a network of λ nodes, where a random node initiates the flood. Then, we apply the standard Glossy and the robust multicast beamforming approach with and without coalition formation and evaluate the performance of each approach at the end of the flood, as in the case of Figs. 8 and 9.
We generate network topologies using a binomial point process with λ=k+L nodes randomly and independently deployed in a square area. We then evaluate energy efficiency using robust multicast beamforming for different values of network side length in meters. Our results are averaged over 100 independent realizations of the network for the same λ. Irrespective of the topology, all transmitting nodes have a source rate R=250 kbps which corresponds to the default setting as prescribed by the IEEE 802.15.4 standard. The first step to optimize the system is solving the programming problem in (21) for each receiver independently. After that, each receiver chooses the number of feedback bits B that minimizes energy consumption. This is shown together with the algorithm steps in Section 3.

6.1 Tightness of bounds

The programming problem in (21) is designed to minimize transmit power under QoS constraints. However, minimizing transmit power does not always mean an increase in energy efficiency. Other factors affect energy efficiency such as outage probability and feedback overhead Pcoop which can be seen in (30). Modifying the optimization problem depends on the reliability requirements of the application. For example, in critical applications, an upper bound on the outage is needed. Therefore, we use the CDF of ||δ||2 acquired by empirical means where outage probability is upper bounded as such Pro≤ Pr(||δ||2>ε2) and we solve for ε(B,K). This bound is not a tight bound because of the random direction of the error δ, which can result in a better or worse quantized channel \(\tilde {\mathbf {h}_{l}}\) than the real channel hl, depending on the direction of the error. Using this approach of accounting for worst case performance results sometimes in over satisfying the reliability requirements, hence a loss in terms of energy efficiency. However, the system can be solved for different number of feedback bits B and ultimately find the optimum B that maximizes energy efficiency while maintaining a maximum outage probability Pro. The tightness of our bound can be seen in Fig. 7, where the reception ratio resulting from solving our robust optimization problem in (21) is calculated for different values of ε2. This is compared in the same plot with the empirical CDF of ||δ||2 for the simulation scenario of K=3 and B=4.
It is critical here to emphasize the relationship between the CDF of ε2 and the reception ratio. Assuming that we use an ε2 corresponding to a 90% in the CDF, this means that 90% of the square of the quantization error norm is indeed below this value, in turn, resulting in a successful reception 90% of the time. However, It is easy to notice that achieving 90% reception ratio requires a smaller ε2 than the one retrieved from the CDF information available at the transmitter. This bound can be tightened further by means of iterated optimization, where instead of minimizing ||δ||2, we minimize δHGδ. This results in recursively choosing a quantized channel \(\tilde {\mathbf {h}_{l}}\) and a beamformer G that further maximize energy efficiency under rate constraints. We leave this approach for future works, and we focus on optimizing the number of feedback bits B using offline databases stored at each node as explained in Section 3.

6.2 System level performance

We now test the performance of our proposed algorithm against state-of-the art Glossy. We consider nine sensor nodes randomly deployed in a square network with varying side length. One randomly chosen node initiates a flood with a required minimum reception ratio of 95% (Pro=5%), then energy consumption and energy efficiency are calculated at the end of the flood for both Glossy and the proposed algorithm. Both metrics are plotted in Figs. 8 and 9 against network side length in meters. Since the number of deployed nodes is fixed, varying the network side length can be seen as varying the network density. First, we notice an increase in power consumption and decrease in energy efficiency for less dense scenarios. This is a result of the flood generating more waves to reach the edges of the network. For example, in a very dense network, once a node initiates a flood, it is very probable that all nodes in the network will receive the information, hence the flood ends in two waves. However, for less dense scenarios, less nodes will receive the data successfully from the initiating node, resulting in more waves and consuming more energy. Second, energy efficiency behavior in Fig. 8 shows that our proposed algorithm greatly outperforms Glossy in dense networks, where nodes are close to each other and the cost of feedback (12) is not too high. This is expected since the feedback power needed for cooperation depends on the distance between nodes. On the other hand, in less dense scenarios, our proposed algorithm faces a degradation in performance due to the increase in feedback energy consumption. This shows that the proposed algorithm is best suited for dense networks scenarios where cooperation provides an edge in energy efficiency.

7 Conclusions

We have studied the problem of robust multicast beamforming in Glossy under imperfect CSI and limited feedback. It was shown that coherent multicast beamforming can lead to significant gains in terms of energy efficiency. By studying the effect of number of feedback bits B on the performance, we show that there exists an optimal B that maximizes energy efficiency. Moreover, the problem was solved for a specific maximum allowed outage probability. The results show that stricter outage requirements, result in higher values of optimal B. The upper bound used on the outage probability can be tightened using iterative beamforming, resulting in lower transmit power while still satisfying the rate constraints. However, we leave this for future investigations. Finally, a study was performed to examine the effect of selecting certain transmitting nodes for cooperation on energy efficiency. The simulation results showed that energy efficiency can be further improved by reducing the number of cooperating transmitters by means of greedy transmitter selection. The exact distributed implementation of mentioned algorithm is left for future efforts.

8 Appendix 1: S-procedure

The S-procedure gives conditions under which a particular quadratic inequality is a consequence of another quadratic inequality [43]. Let A1 and A2 be symmetric matrices, b1 and b2 be vectors, and c1 and c2 be constants. Assuming there exists some x such that:
$$ \mathbf{x}^{H} \boldsymbol{A_{1}} \mathbf{x} + 2\mathbf{b_{1}}\mathbf{x} + c_{1} \geq 0 $$
(33)
then the following holds:
$$ \begin{aligned} & \mathbf{x}^{H} \boldsymbol{A_{2}} \mathbf{x} + 2\mathbf{b_{2}}\mathbf{x} + c_{2} \geq 0\\ \end{aligned} $$
(34)
if and only if there exists a μ≥0, such that:
$$ \left[\begin{array}{ll} \boldsymbol{A_{2}} & \mathbf{b_{2}}\\ \mathbf{b_{2}}^{H} & c_{2}\\ \end{array}\right] - \mu \left[\begin{array}{ll} \boldsymbol{A_{1}} & \mathbf{b_{1}}\\ \mathbf{b_{1}}^{H} & c_{1}\\ \end{array}\right] \succeq 0 $$
(35)

9 Appendix 2: Schur complement

The Schur complement is defined as follows. Assume having:
$$ \boldsymbol{M} = \left[\begin{array}{ll} \boldsymbol{A} & \boldsymbol{B}\\ \boldsymbol{C} & \boldsymbol{D}\\ \end{array}\right] \succeq 0 $$
(36)
where A,B,C, and D are matrices, and D is invertible. Then, the Schur complement of D in M is:
$$ \boldsymbol{A} - \boldsymbol{B}\boldsymbol{D}^{-1}\boldsymbol{C} \succeq 0 $$
(37)
However, if A is invertible, then the Schur complement of A in M is:
$$ \boldsymbol{D} - \boldsymbol{C}\boldsymbol{A}^{-1}\boldsymbol{B} \succeq 0 $$
(38)

Acknowledgements

The work of E. Jorswieck was supported partly by the German Research Foundation, Deutsche Forschungsgemeinschaft, Collaborative Research Center 912, through the Highly Adaptive Energy-Efficient Computing.

Funding

This work was supported by the German Research Foundation (DFG) within the Cluster of Excellence “Center for Advancing Electronics Dresden (cfaed)”, through Priority Programs 1914, and by the European Union’s Horizon 2020 research and innovation program under the Marie Sklodowska-Curie project 641985 (ETN-5Gwireless).

Availability of data and materials

The paper is self-contained, since we provide the protocol operations that can be used to reproduce the results presented with the help of Section 6 where numerical results and parameter settings are described in details.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Literatur
5.
Zurück zum Zitat A. Abdelkader, E. Jorswieck, M. Zimmerling, in European Wireless 2017; 23th European Wireless Conference. Centralized and distributed optimum power control and beam-forming in network flooding, (2017), pp. 1–6. A. Abdelkader, E. Jorswieck, M. Zimmerling, in European Wireless 2017; 23th European Wireless Conference. Centralized and distributed optimum power control and beam-forming in network flooding, (2017), pp. 1–6.
6.
Zurück zum Zitat F. Ferrari, M. Zimmerling, L. Thiele, O. Saukh, in Proc. of the ACM/IEEE IPSN. Efficient network flooding and time synchronization with Glossy, (2011). F. Ferrari, M. Zimmerling, L. Thiele, O. Saukh, in Proc. of the ACM/IEEE IPSN. Efficient network flooding and time synchronization with Glossy, (2011).
12.
Zurück zum Zitat S. Stanczak, M. Wiczanowski, H. Boche, Fundamentals of resource allocation in wireless networks: theory and Algorithms, 2nd edn. (Springer Publishing Company, Incorporated, New York City, 2009).MATH S. Stanczak, M. Wiczanowski, H. Boche, Fundamentals of resource allocation in wireless networks: theory and Algorithms, 2nd edn. (Springer Publishing Company, Incorporated, New York City, 2009).MATH
23.
Zurück zum Zitat L. Wang, C. Zhang, J. Zhang, G. Wei, in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM’09. Distributed beamforming with limited feedback in regenerative cooperative networks (IEEE PressPiscataway, 2009), pp. 1301–1304. http://dl.acm.org/citation.cfm?id=1736862.1737177. L. Wang, C. Zhang, J. Zhang, G. Wei, in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM’09. Distributed beamforming with limited feedback in regenerative cooperative networks (IEEE PressPiscataway, 2009), pp. 1301–1304. http://​dl.​acm.​org/​citation.​cfm?​id=​1736862.​1737177.
26.
Zurück zum Zitat P. Levis, N. Patel, D. Culler, S. Shenker, in In Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks, (2004), pp. 15–28. P. Levis, N. Patel, D. Culler, S. Shenker, in In Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks, (2004), pp. 15–28.
27.
Zurück zum Zitat A. Abdelkader, J. Richter, E. A. Jorswieck, M. Zimmerling, in Proceedings of the International Conference on Computer Communications and Networks. Multi-flow glossy: physical-layer network coding meets embedded wireless systems (Vancouver, 2017). A. Abdelkader, J. Richter, E. A. Jorswieck, M. Zimmerling, in Proceedings of the International Conference on Computer Communications and Networks. Multi-flow glossy: physical-layer network coding meets embedded wireless systems (Vancouver, 2017).
29.
Zurück zum Zitat D. Tse, P. Viswanath, Fundamentals of wireless communication (Cambridge University Press, New York, 2005).CrossRef D. Tse, P. Viswanath, Fundamentals of wireless communication (Cambridge University Press, New York, 2005).CrossRef
30.
Zurück zum Zitat D. G. Luenberger, Optimization by Vector Space Methods, 1st edn. (Wiley, New York, 1997). D. G. Luenberger, Optimization by Vector Space Methods, 1st edn. (Wiley, New York, 1997).
31.
Zurück zum Zitat IEEE standard for information technology– local and metropolitan area networks– specific requirements– part 15.4: Wireless l (MAC) and (PHY) specifications for low rate (WPANs). IEEE Std 802.15.4-2006. IEEE standard for information technology– local and metropolitan area networks– specific requirements– part 15.4: Wireless l (MAC) and (PHY) specifications for low rate (WPANs). IEEE Std 802.15.4-2006.
32.
Zurück zum Zitat M. Ceriotti, et al, in ACM/IEEE IPSN. Monitoring heritage buildings with wireless sensor networks: the Torre Aquila deployment, (2009). M. Ceriotti, et al, in ACM/IEEE IPSN. Monitoring heritage buildings with wireless sensor networks: the Torre Aquila deployment, (2009).
33.
Zurück zum Zitat K. Y. Wang, T. H. Chang, W. K. Ma, C. Y. Chi, in 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Optimal transmission strategy for outage rate maximization in MISO fading channels with training, (2012), pp. 2945–2948. https://doi.org/10.1109/ICASSP.2012.6288533. K. Y. Wang, T. H. Chang, W. K. Ma, C. Y. Chi, in 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Optimal transmission strategy for outage rate maximization in MISO fading channels with training, (2012), pp. 2945–2948. https://​doi.​org/​10.​1109/​ICASSP.​2012.​6288533.
36.
Zurück zum Zitat F. Ferrari, M. Zimmerling, L. Mottola, L. Thiele, in Proc. of the 10th ACM SenSys. Low-power wireless bus, (2012). F. Ferrari, M. Zimmerling, L. Mottola, L. Thiele, in Proc. of the 10th ACM SenSys. Low-power wireless bus, (2012).
37.
Zurück zum Zitat M. Zimmerling, L. Mottola, P. Kumar, F. Ferrari, L. Thiele, Adaptive real-time communication for wireless cyber-physical systems. ACM Trans. Cyber-Physical Syst.1(2) (2017).CrossRef M. Zimmerling, L. Mottola, P. Kumar, F. Ferrari, L. Thiele, Adaptive real-time communication for wireless cyber-physical systems. ACM Trans. Cyber-Physical Syst.1(2) (2017).CrossRef
39.
Zurück zum Zitat M. Grant, S. Boyd, in Recent Advances in Learning and Control. Lecture Notes in Control and Information Sciences, ed. by V. Blondel, S. Boyd, and H. Kimura. Graph implementations for nonsmooth convex programs (SpringerNew York City, 2008), pp. 95–110. http://stanford.edu/~boyd/graph_dcp.html. M. Grant, S. Boyd, in Recent Advances in Learning and Control. Lecture Notes in Control and Information Sciences, ed. by V. Blondel, S. Boyd, and H. Kimura. Graph implementations for nonsmooth convex programs (SpringerNew York City, 2008), pp. 95–110. http://​stanford.​edu/​~boyd/​graph_​dcp.​html.
Metadaten
Titel
Robust adaptive distributed beamforming for energy-efficient network flooding
verfasst von
Abdelrahman Abdelkader
Eduard Jorswieck
Publikationsdatum
01.12.2019
Verlag
Springer International Publishing
DOI
https://doi.org/10.1186/s13638-019-1434-0

Weitere Artikel der Ausgabe 1/2019

EURASIP Journal on Wireless Communications and Networking 1/2019 Zur Ausgabe