Documente Academic
Documente Profesional
Documente Cultură
log
) in [6],
where is the number of the nodes. While a highway system
that consists of both horizontal and vertical edge-disjoint paths
exists in a square network, B. Liu et al. in [1] pointed out that the
horizontal paths will disappear if the width of a strip network
is increasing more slowly than log . In this paper, rst we take
a deeper look at the percolation in a strip network. We discover
that when a highway system exists, the capacity is restricted
by the maximum length of the sides. Moreover, a sub-highway
system is still in presence when the highway system disappears.
Secondly, we consider the situations in a triangle network. Condi-
tions that percolation highway exists in it, and the achievable rate
for a triangle network are discussed. We nd that corner effect
can be a bottleneck of the capacity. By combining the achievable
rate of the former networks, we attribute the variance between
them to their symmetry discrepancies. Finally, we turn to the
capacity of three dimensional (3D) networks via percolation. The
whole study shows that geometric symmetry plays a signicant
role in the percolation and the capacity, thereby shedding a light
on the network design and the scheduling.
Index TermsCapacity, geometry, symmetry, percolation the-
ory.
I. INTRODUCTION
A
fundamental issue about wireless ad hoc network is that
how much information it is capable of conveying, or, the
network capacity. In the inaugurating work proposed by Gupta
and Kumar ([6]), they studied the capacity of such network
scaling with the number of nodes in a xed area. The results
of [6] showed that the transport capacity scales as (
) for
arbitrary networks, where is the area of the region and is
the number of the nodes. Or equivalently, the largest amount
of information that can be transferred from each source to
destination is (
1
log
),
which is achieved under a direct routing strategy - forwarding
the packets along the line connecting the source and the
destination. Notice that there is a gap on the capacity between
random networks and arbitrary networks. This was believed
due to randomness of the node locations and the source-
destination selection. However, the upper bound obtained in
[18] by information theory permits an attainable rate higher
than (
1
log
).
To increase the throughput capacity of random networks,
a variety of methods have been implemented. For example,
node mobility was rst exploited to improve the capacity to
(1) in [7], then the induced delay effect was analyzed in
[8][9][10] [23]. Another way by adding base stations to the
ad hoc networks was studied in [11][12][13] [14][22], and
different routing strategies were investigated in [15][16].
While these methods need additional assumptions besides
the original random ad hoc networks, M. Franceschetti et
al. in [5] showed that a
1
,
1
()
}), where
is the length and () is the width of the strip
1
. If
Max{, ()} = (
log
) and (
1
).
Otherwise, the capacity decreases due to the asymmetry.Thus,
we conclude that symmetry is a key factor for the percolation
and the capacity.
Finally, we extend the percolation to 3D networks. By a tool
of projection decomposition, we prove that the achievable rate
is
1
3
.
For simple approximation, we assume (, ) = min{1,
},
with > 2 for 2D case and > 3 for 3D case.
We treat all the interferences at the receiver simply as noise,
since we are interested only about a lower bound on the
achievable rate. For a direct link between any two nodes with
an unit bandwidth, data rate is given by the channel capacity
= log
(
1 +
(, )
0
+
=
(, )
)
bit/s (1)
where
0
is the power of the Gaussian white noise at the
receiver. Note that this assumption is more realistic compared
with the Protocol Model and the Physical Model. And, the re-
sults of this paper can also be generalized to random networks
under the Protocol Model when different transmission ranges
are allowed, or under the Physical Model using different
powers for transmission.
B. Related Works
Percolation theory characterizes the behavior of connected
clusters in a random graph. A representative example in
physics is described in [5], and [2][3][4] provide more in-
formation about this eld.
In [5], M. Franceschetti et al. tessellate the network by sub-
squares
()
log
> 0.
The proof is enclosed in Appendix slowromancapi@. The-
orem 3.1 indicates the equivalent condition for the presence of
the highway backbone in the direction parallel with the length
Fig. 2. Horizontal highways in a strip network. The strip is partitioned
into sub-rectangles
) with
log ()
> 0.
Moreover, the following corollary is immediate by Theorem
3.1.
Corollary 3.1: If lim
()
log
> 0, then there are a number
of (()) edge-disjoint highways across from left to right
in a strip network.
Consider the relationship between () and in Fig. 2.
Provided that lim
()
log
> 0 and lim
log ()
> 0, by
Theorem 3.1, we declare that highway exists in both directions
parallel with the width and the length. Now, if we adopt the
four-phrase routing strategy as in [5], it will follow that
Theorem 3.2: In the supercritical scenario of a strip net-
work, the throughput capacity is (Min{
1
,
1
()
}), where
= () via using a four-phase routing strategy. Supple-
mentary conditions lim
()
log
> 0 and lim
log ()
> 0
should be added to ensure that it is a supercritical network.
To prove this, we need present the following lemmas in the
rst place.
Lemma 3.1: For any integer > 0, there exists an () >
0, such that in each square
}
nodes inside each rectangle.
Lemma 3.3: If is a constant, partition the strip into an
integer number
}
nodes inside each rectangle.
Remark 3.1: First, Lemma 3.1 is obtained by letting = 0
in Theorem 3 of [5]. Secondly, regard each rectangle
as a cell in [1], then Lemma 3.2 yields as an adaptation of
Lemma 3 in [1] by letting =
()
= (log
is log
log ())
+2
log
, where constant
is dened
similarly as .
Then, we consider the trafc load on a horizontal highway.
Refer to Lemma 3.2, we have the maximum number of nodes
whose packets need to be relayed along the horizontal highway
is 3 max{, log
()
log ()
> 0, the number of nodes is w.h.p.
(). Since the length of each hop along the highway is
bounded by a constant, by Lemma 3.1, the capacity of the
highway is (1). Thus, the achievable rate for each node is
(
1
,
1
()
}).
Here we have a discussion of the minimal rates dependence
on . According to Theorem 3.2, without losing generality,
assume () = (), we have
= (
1
). Notice
that
= (
1
= (
1
log
). Then, if = (
log ), or
equivalently
()
= (log ), we have
;
otherwise, if = (
log ), or equivalently
()
=
(log ), we have
.
B. Subcritical scenario in a strip network
In the next place, we derive an achievable rate in the
subcritical scenario via constructing a sub-highway system.
To start with, consider a scenario lim
()
log
= 0, but
lim
()
log log
> 0, the sub-highway is constructed as follows.
In Fig. 3, partition the length on the scale of log . More
precisely, for a given
1
, we divide the strip into rectangles
of sides length (
1
log
1
) ().
1
is selected
as the smallest value such that the number of the rectangles
1
log
1
is an integer.
Then we divide each rectangle
into slices
of sides
(
1
log
1
) (
2
log log
2
), among which
2
is a
given constant and
2
is chosen similarly as
1
. Applying the
same arguments of sufcient condition in Theorem 3.1 to each
slice, we have that there are a number of
1
log log paths
inside
, where
1
=
1
(
2
, ) is a constant.
2
Rigorously speaking, the maximum length of the hop is log +
2.
While it has no affect if we omit the constant
2.
Fig. 3. Sub-highway system in a strip network. The strip is partitioned into
rectangles
()
2
log log
2
. The extreme
right point of the th highway in
1
1
is
. A malposition between
and
()
log
= 0, they are probably not able to connect
with the highways in a neighboring slice to form a integral
highway. In Fig. 3, a malposition of the paths between two
adjacent slices is illustrated.
While if we number the highways inside
from 1 to
1
log log , the malposition of the corresponding number
of highways between two slices is upper bounded by the
width of the slice
2
log log
2
. Data packets can be
carried through the paths consisted of highways with the same
mark number. We call these paths sub-highways. Notice that
percolation highway exists in the vertical direction. Thus, to
exploit the horizontal sub-highway and the vertical highway,
we use a four-phase routing scheme as well, and present the
following theorem to make the achievable rate precise.
Theorem 3.3: In the subcritical scenario of a strip network,
if lim
()
log
= 0, but lim
()
log log
> 0, the achievable rate
is (
1
(log log )
+2
).
Proof: In accordance with the routing scheme, each
node transmits data to the entry point of a corresponding
sub-highway. The maximum length of the hop is less than
2
log log , thus by Lemma 3.1, we have the achievable rate
is (
1
(log log )
+2
). Moreover, since the number of nodes in-
side each square
) =
(log ()) = (log ) , then the achievable rate is
(
1
(log log )
+2
log
) in a rst phase.
In a second phase, packets are delivered along the sub-
highway. Although there is not a continuous highway going
through out the strip from the right to the left, the sub-
highways with the same mark number can be made to compose
a highway with breaking points. However, the breaking points
would lower the rate along the deemed highway since the
distance between two breaking points is no longer bounded
by a constant. Observe that the length of each hop on the
highway inside each
).
Next, we consider the rate of a third phase. Since
lim
log ()
= , there are (log ()) vertical perco-
lation highways in each rectangle with sides length ()
log (). Hence, with reference to Lemma 3.3, packets
generated by at most 3 log
is
log w.h.p., therefore the achievable rate for each node is
(
1
(log ())
+2
log
).
Taking the minimum rate in the four phases into account,
the achievable rate is determined by that of a second phase,
which concludes the theorem.
In a more general scenario, assume (, ) =
log log ... log
, then if lim
()
(,1)
= 0, but
lim
()
(,)
> 0, availing the same procedures as the
proof in Theorem 3.3, we have that the achievable rate
= (
1
((,))
+2
(
1
B C
A
D
i
R
E
F
i
S
Fig. 4. Sufcient condition for percolation highway in a triangle network.
triangle by rectangles
. Then we
have:
Theorem 4.1: Consider the situation or is
obtuse, if
log
= () and lim
()
log
> 0, then there are
(log ) percolation highways across each slice
from left
to right.
Proof: It is easy to see that if the covering scheme exists,
there will be (log ) percolation highways across each slice
()
log
> 0. Next, we prove that
lim
log
= ().
In Fig. 4, since , we have
, i.e. =
()
(log ). Thus, in ,
=
2
2
= (log )
(
()
)
2
1.
If lim
()
= , then =
()
(log ); else,
= log .
Observe = + , hence in the rst case,
we have = +
()
(log ) = +
2
(log
). Now that , + log . Thus, if =
(log ), then the covering scheme exists. It yields that
lim
log
= (). In the second case, we have =
+ (log ), which means = (). Combine these
two cases together, we conclude the theorem.
Next, we analyze the achievable rate when we utilize the
highway system. In Fig. 5, for simplicity, suppose =
(
1
), = (
1
), = (
1
), where
1
,
1
,
1
are con-
stants. We provide the following theorem.
Theorem 4.2: If the sides length of a triangle network are
given above, the maximum achievable rate is (
1
), when
1
=
1
=
1
=
1
2
.
Proof: Without losing generality, we assume that
1
1
1
. Then, according to the triangle inequity, we have
+, which yields that
1
=
1
.
Firstly, consider the percolation highway in the direction
parallel with , as illustrated in the left side of Fig. 5.
If and are acute, then since lim
log
=
lim
2
1
1
log
1
= , there are (log
1
) = (log ) highways
across the triangle from left to right. If or is
obtuse, see Fig. 4, in Theorem 4.1, let =
2
, notice that
log
=
2
2 log
= (), and lim
log
= lim
2
1
1
log
2
1
= ,
then there are (log ) = (log
2
1
) = (log ) highways
HU et al.: A GEOMETRY STUDY ON THE CAPACITY OF WIRELESS NETWORKS VIA PERCOLATION 2921
C
A B
1
X
2
X
1
Y
2
Y
D E
F G
C
A B
3
X
3
Y
D
E
G
H
1
X
1
Y
2
X
2
Y
F
Fig. 5. Achievable rate in a triangle via using the percolation highway.
Percolation highway in the direction parallel with edge and are
shown in the left side and the right side of the gure respectively.
across the triangle from left to right. Moreover, similarly, we
have percolation highway exists in the direction parallel with
edge as well. Hence, we can also use a four-phase routing
scheme to deliver the packets.
According to the routing scheme, in a rst phase, each
source node sends packets to the entry point on the highway.
Commonly, the highway nearest to the source node is assigned
to it for convenience. For example, for node
1
in Fig. 5,
its entry point is denoted by
1
on the highway under it.
Thus, the maximum length of the hop to reach the highway is
on the scale of log . While there are some exception nodes
in the corner of the triangle, like
2
, they can not nd a
highway nearest to them in the vertical direction. Thus, they
must deliver their packets to a nearest highway in the inclined
direction. We refer to this as corner effect.
In this case, the maximum hop length will be on the
scale of or , which is larger than that of
the normal case. Notice that , we have
=
= (
log
2
1
2
1
1
1
) = (
log
1
1
1
).
Then, by Lemma 3.1 and consider the maximum number of
nodes in a sub-square
1
1
1
)
+2
log )) = (
1
(
1
+
1
1)(+2)(log )
+3
).
Similarly, we have =
= (
log
2
1
2
1
1
1
) =
(
log
1
1
1
). From this, we can get that and
are on the same scale.
In a second phase, the packets are relayed along the
highway. As shown in Fig. 6, if we slice the triangle into
slices
with
equals to the height of the triangle, and suppose there are
also nodes distributed according to a Poisson point process
inside it. Note that the size of the rectangle is twice of the
triangle, implicating the number of the nodes inside them are
on the same order. We have that the number of nodes inside
1
) using Lemma 3.2, we obtain that the
number of nodes draining data to a highway is (
1
). Thus,
we have the achievable rate is (
1
1
).
A
B C
B C
i
S
i
R
c
Fig. 6. Bound the number of nodes inside each slice
.
Afterward, we look at the highway in the direction parallel
with . Similar to a second phase, we have that the
achievable rate is (
1
1
) = (
1
1
).
In a last phase, destination nodes receive the packets
from the highway. Due to the corner effect, the whole
all rate is restricted by the transmission rate in the
corner of and . Thus, we have the
achievable rate is (Min{
1
+2
log
,
1
+2
log
}) =
(Min{
1
(
2
1
1
log )
+2
log
,
1
(
1
+
1
1
log )
+2
log
}) =
(Min{
1
(2
1
1)(+2)
(log )
+3
,
1
(
1
+
1
1)(+2)
(log )
+3
}).
Taking the minimum rate in the above discussion
into account, we have the achievable rate in fact is
(Min{
1
(2
1
1)(+2)
(log )
+3
,
1
1
}). Observe that
in the left gure, hence
1
1
1
. Combining with
1
1
, we have
1
1
2
. Thus, the maximum achievable rate
is (
1
. For
convenience, we setup a coordinate system xing the origin
at an vertex of the cube. To begin our construction, we
tessellate the cube by micro-cubes of constant edge length .
We call such a micro-cube m-cube for brevity. Denote a m-
cube by
,,
, if the coordinate of the center of the cube
is (
21
2
,
21
2
,
21
2
). Consider the number of the nodes
(
,,
) inside
,,
. For all , , , we have the probability
that there is at least one node in it, or, the m-cube is lled in,
is
((
,,
) 1) = 1 ((
,,
) = 0) = 1
3
.
(2)
We expect there exists a highway system composed of
percolation highways in , , directions, and the data can
be delivered towards any direction such as in the 2D scenario.
Suppose is an integer, we select a vertical section from
the cube, where all the points share an -coordinate between
Fig. 8. The tessellation of a vertical section. The blue edges are open if
there is at least a node inside the corresponding cube of the m-square.
(1) and . Then, the section cuts a number of
3
m-
cubes, and the section will be tessellated by micro-squares(or
m-squares) formed by projecting these m-cubes onto , as
Fig. 8 shows. We call a m-cube is corresponding cube to a
m-square, or vice versa, if the square is the projection of this
cube.
Now, we connect a diagonal of each m-square in the
way depicted in Fig. 8. Then, a 45
nodes inside a
cuboid of sides length
3
, or
3
, or
3
.
HU et al.: A GEOMETRY STUDY ON THE CAPACITY OF WIRELESS NETWORKS VIA PERCOLATION 2923
Remark 5.1: Lemma 5.1 is obtained by proposing a TDMA
scheme for the transmissions, and bounding the interferences
and the signal at the receiver respectively. The proof is
given in Appendix slowromancapii@. Besides, Lemma 5.2 is
straightforward by the Chernoff bound adopted in Lemma 2
of [5].
Since there are three orthogonal directions in a cubic
network, we need a ve-phase routing strategy to deliver the
packets. In a rst phase, a source transmits data to the entry
point of the highway. In the next three phases, packets are
relayed along the highway in the three directions successively.
And in a last phase, the destination receives data from the exit
point of the highway. Like a square network, the bottleneck
of the achievable rate is that along the highway. Observe the
length of the hop is bounded by a constant, thus by Lemma
5.1, we have the rate over each hop is (1). Furthermore,
according to Lemma 5.2, the number of nodes draining their
packets to a highway in any direction is upper bounded by
2
2 3
).
B. Cuboid network
Consider a more complex case, say a cuboid network, where
the length of the edges could be unequal. Assume the scale
of the cuboid is () () (), if lim
()
log ()
= 0
and lim
()
log ()
= 0, then we declare the absence of the
percolation highway in the direction of ; otherwise, the
highway exists. If highway exists in the , , directions, the
achievable rate could be (Min{
1
()
,
1
()
,
1
()
}), which is
maximum as (
1
3
).
In this section, we nd that the capacity of a higher
dimensional network is larger due to the percolation highway
emerges towards more orthogonal directions, which will re-
duce the burden on the packets relay. Moreover, from a cuboid
network, we nd that the symmetry of the scale is still an
important factor for the capacity.
VI. CONCLUSIONS
In this paper, we investigate the impact of the geometry
on the percolation and the capacity among different network
models. In a strip network, the achievable rate is restricted by
the maximum length of the sides in the supercritical scenario.
And in the subcritical scenario, we gure out that the capacity
will degenerate to that of a 1D network in a step by step
manner. These results are basically due to the asymmetry of
the strip, while a square network has an achievable rate
1
()
log
= 0, then lim
()
log
=
lim
()
log
log
log
< lim
()
log
1 = 0. From Appendix
B in [1], we know the absence of highway backbone parallel
with the width, which points out the necessary condition in
Theorem 3.1. On the other hand, if lim
()
log
> 0, then by
following the same proof procedures of Theorem 5 in [5], we
have
log ) = (
log ))
()
log
(
4
3
(+ 1)
log
1
+log 6(1)
(6(1 ))
)
()
log
,
(4)
where
= min
, and is the
probability that an edge is open in the edge-percolation model
of Fig. 1. Notice that , and
log ) = 0, (6)
which proves that there are w.h.p. at least log highways
inside each rectangle
2
edge-disjoint horizontal highways inside it, we
have the number of the highway is (log ).
2924 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 10, OCTOBER 2010
d
Fig. 9. A TDMA schedule. Nodes inside the cubes corresponding the gray
squares can transmit simultaneously.
APPENDIX SLOWROMANCAPII@
ACHIEVABLE RATE OF THE TRANSMISSIONS WITHIN A
CERTAIN DISTANCE IN 3D NETWORKS
Proof: We divide time into a sequence of
3
successive
slots, with = 2(+1). Then, we consider the disjoint set of
m-cubes
,,
that are allowed to transmit at the same time,
as illustrated in Fig. 9. Suppose a transmitter in a given m-cube
transmits toward a destination located in a cube at distance no
more than m-cubes away. First, we nd an upper bound on
the interferences at the receiver. Notice that the transmitters in
the 3
3
1 closest m-cubes are located at Euclidean distance
at least ( + 1) from the receiver. The 5
3
3
3
next closest
m-cubes are at Euclidean distance at least (3 + 3), and so
on. Thus, we can bound the interferences by
()
=1
((2 + 1)
3
(2 1)
3
)((2 1)( + 1))
= (( + 1))
=1
2(12
2
+ 1)(2 1)
(7)
notice that this sum will converge if > 3.
Next, we observe that the distance between the transmitter
and the receiver is at most . Hence, the signal at the receiver
can be bounded by
() () = min{1,
} (8)
Combining (7) and (8), we obtain a lower bound on the rate
() = log
(
1 +
()
0
+()
)
(9)
which does not depend on , and hence the rst part of the
theorem immediately follows. We now let , then after
some computations it follows easily that () = (
).
Finally, accounting for the time division into
3
= 8( +
1)
3
time slots, the rate available in each m-cube is actually
(
3
).
REFERENCES
[1] B. Liu, P. Thiran, and D. Towsley, Capacity of a wireless ad hoc
network with infrastructure," in Proc. ACM MobiHoc, Sep. 2007.
[2] G. R. Grimmett, Percolaiton, 2nd edition. New York: Springer-Verlag,
1999.
[3] D. Stauffer and A. Aharony, Introduction to Percolation Theory. London:
Taylor & Francis, 2003.
[4] M. Sahimi, Applications of Percolation Theory. London: Taylor &
Francis, 1994.
[5] M. Franceschetti, O. Dousse, and D. N. C. Tse, Closing the gap in the
capacity of wireless networks via percolation theory," IEEE Trans. Inf.
Theory, vol. 53, no. 3, pp. 1009-1018, Mar. 2007.
[6] P. Gupta and P. R. Kumar, The capacity of wireless networks," IEEE
Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
[7] M. Grossglauser and D. N. C. Tse, Mobility increases the capacity of
ad hoc wireless networks," IEEE/ACM Trans. Networking, vol. 10, no.
4, pp. 477-486, Aug. 2002.
[8] G. Sharma, R. Mazumdar, and N. Shroff, Delay and capacity trade-offs
in mobile ad hoc networks: a global perspective," IEEE/ACM Trans.
Networking, vol. 15, no. 5, pp. 981-992, Oct. 2007.
[9] X. Lin, G. Sharma, R. R. Mazumdar, and N. B. Shroff, Degenerate
delay-capacity trade-offs in ad hoc networks with Brownian mobility,"
IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2777-2784, June 2006.
[10] G. Sharma and R. R. Mazumdar, Delay and capacity trade-off in
wireless ad hoc networks with random way-point mobility," preprint,
Dept. of ECE, Purdue University. [Online]. Available: http://ece.purdue.
edu/$\sim$gsharma/,2005.
[11] U. C. Kozat and L. Tassiulas, Throughput capacity of random ad hoc
networks with infrastructure support," in Proc. ACM MobiCom, Sep.
2003.
[12] S. Toumpis, Capacity bounds for three classes of wireless networks:
asymmetric, cluster, and hybrid," in Proc. ACM MobiHoc, May 2004.
[13] A. Zemlianov and G. de Veciana, Capacity of ad hoc wireless networks
with infrastructure support," IEEE J. Sel. Areas Commun., vol. 23, no.
3, pp. 657-667, Mar. 2005.
[14] A. Agarwal and P. R. Kumar, Capacity bounds for ad hoc and hybrid
wireless networks," ACM SIGCOMM Comput. Commun. Rev., vol. 34,
no. 3, pp. 71-81, July 2004.
[15] B. Liu, Z. Liu, and D. Towsley, On the capacity of hybrid wireless
networks," in Proc. IEEE InfoCom, Apr. 2003.
[16] Y. Pei, J. W. Modestino, and X. Wang, On the throughput capacity of
hybird wireless networks using an L-maximum-hop routing strategy,"
in Proc. IEEE Veh. Technol. Conf., Oct. 2003.
[17] J. Liu, D. Goeckel, and D. Towsely, Bounds on the gain of network
coding and broadcasting in wireless networks," in Proc. IEEE InfoCom,
May. 2007.
[18] L. L. Xie and P. R. Kumar, A network information theory for wireless
communication: scaling laws and optimal operation," IEEE Trans. Inf.
Theory, vol. 50, no. 5, pp. 748-767, May 2004.
[19] A. keshavarz-Haddad, R. Riedi, Bounds for the capacity of wireless
multihop networks imposed by topology and demand," 8th ACM Mobi-
Hoc, Montral, Qubec, Canada, Sep. 2007.
[20] A. Keshavarz-Haddad, R. Riedi, Multicast capacity of large homoge-
neous multihop wireless networks," 6th WiOpt, Berlin, Germany, Apr.
2008.
[21] P. Gupta and P. Kumar, Internet in the sky: the capacity of three
dimensional wireless networks," Commun. Inf. Syst., vol. 1, no. 1, pp.
33-50, 2001.
[22] P. Li and Y. Fang, The capacity of heterogeneous wireless networks,"
IEEE International Conf. Comput. Commun., San Diego, CA, Mar.
2010.
[23] P. Li, Y. Fang, and J. Li, Throughput, delay, and mobility in wireless
ad hoc networks," IEEE International Conf. Comput. Commun., San
Diego, CA, Mar. 2010.
[24] X. Li, Y. Liu, S. Li, and S. Tang, Multicast capacity of wireless ad
hoc networks under Gaussian channel model," IEEE Trans. Networking,
vol. PP, no. 99, Nov. 2009.
[25] C. Wang, S. Tang, X. Li, C. Jiang, and Y. Liu, Multicast throughput of
hybrid wireless networks under Gaussian channel model," IEEE ICDCS
2009, Montreal, Quebec, Canada, June 2009.
[26] S. Li, Y. Liu, and X. Li, Capacity of large scale wireless networks
under Gaussian channel model," ACM MobiCom08, CA, USA, Sep.
2008.
[27] X. Wang, Y. Bei, Q. Peng, and L. Fu, Speed improves delay-capacity
tradeoff in motioncast," to appear in IEEE Trans. Parallel Distributed
Syst., 2010.
[28] G. Zhang, Y. Xu, X. Wang, and M. Guizani, Capacity of hybrid wireless
networks with directional antenna and delay constraint," to appear in
IEEE Trans. Commun., 2010
HU et al.: A GEOMETRY STUDY ON THE CAPACITY OF WIRELESS NETWORKS VIA PERCOLATION 2925
Chenhui Hu received B.S. and M.S. degree from the Department of
Electrionic Engineering, Shanghai Jiaotong University, Shanghai, China, in
2007 and 2010 respectively. From 2007 to 2010, he was doing research in
the Institute of Wireless Communication Technology (IWCT) in Shanghai
Jiao Tong University, supervised by Prof. Xinbing Wang and Youyun Xu.
His research interests include wireless capacity and connectivity, asymptotic
analysis of mobile ad hoc networks, multicast, distributed MIMO, percolation
theory. He will pursue Ph.D degree in the School of Engineering and Applied
Sciences in Harvard, 2010.
Xinbing Wang received the B.S. degree (with hons.)
from the Department of Automation, Shanghai Jiao-
tong University, Shanghai, China, in 1998, and the
M.S. degree from the Department of Computer Sci-
ence and Technology, Tsinghua University, Beijing,
China, in 2001. He received the Ph.D. degree, major
in the Department of electrical and Computer Engi-
neering, minor in the Department of Mathematics,
North Carolina State University, Raleigh, in 2006.
Currently, he is a faculty member in the Depart-
ment of Electronic Engineering, Shanghai Jiaotong
University, Shanghai, China. His research interests include resource allocation
and management in mobile and wireless networks, TCP asymptotics analysis,
wireless capacity, cross layer call admission control, asymptotics analysis
of hybrid systems, and congestion control over wireless ad hoc and sensor
networks. Dr. Wang has been a member of the Technical Program Committees
of several conferences including IEEE INFOCOM 2009-2011, IEEE ICC
2007-2011, IEEE Globecom 2007-2011.
Zichao Yang is currently pursing his B.E. degree
of Electronic Engineering in Shanghai Jiao Tong
University, China. He is working with Prof. Xin-
bing Wang in Institute of Wireless Communication
Technology of Shanghai Jiao Tong University. His
research interests are in the analysis of capacity
and connectivity of wireless ad-hoc network with
percolation theory.
Jianfeng Zhang received bachelor degree in 1984 and master degree in 1989
both from Nanjing institute of Communication Engineering. He is a professor
in Department of Telecommunications Engineering, Nanjing institute of
Communication Engineering. His research interest lies in embedded systems,
wireless sensor networks and mobile communication systems.
Youyun Xu was born in 1966. He was graduated
from Shanghai Jiao Tong University with Ph.D.
Degree in Information and Communication Engi-
neering in 1999. He is currently a professor with
Nanjing Institute of Communication Engineering,
China. He is also a part-time professor with the
Institute of Wireless Communication Technology of
Shanghai Jiao Tong University (SJTU), China. Dr.
Xu has more than 20 years professional experi-
ence of teaching and researching in communication
theory and engineering. Now, his research interests
are focusing on New Generation Wireless Mobile Communication System
(IMT-Advanced and Related), Advanced Channel Coding and Modulation
Techniques, Multi-user Information Theory and Radio Resource Management,
Wireless Sensor Networks, Cognitive Radio Networks, etc. He is a member
of IEEE, a senior member of Chinese Institute of Electronics.
Xinbo Gao received the BSc, MSc and PhD de-
grees in information and communication Engineer-
ing from Xidian University, China, in 1994, 1997
and 1999 respectively. From 1997 to 1998, he was
a research fellow in the Department of Computer
Science at Shizuoka University, Japan. From 2000
to 2001, he was a postdoctoral research fellow in
the Department of Information Engineering at the
Chinese University of Hong Kong. Since 2001,
he joined the School of Electronic Engineering at
Xidian University. Currently, he is a professor of
pattern recognition and intelligent system, and Director of the VIPS Lab,
Xidian University. His research interests include computational intelligence,
pattern recognition, video analysis, and wireless communications. In these
areas, he has published 4 books and around 100 technical articles in refereed
journals and proceedings including IEEE TIP, TCSVT, TNN, TSMC etc. He
is on the editorial boards of international journals including EURASIP Signal
Processing (Elsevier) and Neurocomputing (Elsevier). He served as general
chair/co-chair or program committee chair/co- chair or PC member for around
30 major international conferences.