Push the limit of wireless network capacity: a tale of cognitive and coexistence

Understanding the asymptotic network capacity has been one of the heavily investigated research problems that are instrumental to network design and planning. The majority of the past efforts has been focusing on a single technology network without dynamic channel states and dynamic channel access. In this talk, we will discuss the potential impact of two new technologies (\ie, cognitive radio and coexistence of cross-technology networks) on some fundamental network performance limits. Providing predictable performance and understanding the performance limit have been extremely challenging because of the uncontrollable and hard-to-predict external disturbances and opportunities. In the first part of the talk, we will summarize recent results on designing zero-regret online channel access schemes for multihop wireless networks based on recent development of multi-armed bandits problem. Recently several novel solutions were proposed for cross-technology coexistence without intervening legacy systems. In the second part of the talk, we will summarize recent efforts on designing co-prosperity wireless networks. We mainly focus on protecting the low-power Zigbee networks from the nearby WiFi networks. Then based on the new paradigms of cognitive radio networks and cross-technology coexistence, we give a first try to mathematically model the multihop cognitive radio networks with online spectrum access, and model the coexistability of two networks. We propose to further investigate the network capacity under these two new paradigms.

[1]  Naumaan Nayyar,et al.  Decentralized learning for multi-player multi-armed bandits , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[2]  Xiang-Yang Li Multicast Capacity of Wireless Ad Hoc Networks , 2009, IEEE/ACM Transactions on Networking.

[3]  Guoliang Xing,et al.  Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance , 2010, The 18th IEEE International Conference on Network Protocols.

[4]  Srinivasan Seshan,et al.  Clearing the RF smog: making 802.11n robust to cross-technology interference , 2011, SIGCOMM.

[5]  Zhang Lan,et al.  ZIMO: building cross-technology MIMO to harmonize zigbee smog with WiFi flash without intervention , 2013, MOBICOM 2013.

[6]  Bhaskar Krishnamachari,et al.  Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations , 2010, IEEE/ACM Transactions on Networking.

[7]  Andreas Terzis,et al.  Surviving wi-fi interference in low power ZigBee networks , 2010, SenSys '10.

[8]  Qing Zhao,et al.  Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.

[9]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[10]  Qing Zhao,et al.  Learning in a Changing World: Restless Multiarmed Bandit With Unknown Dynamics , 2010, IEEE Transactions on Information Theory.

[11]  Yunhao Liu,et al.  CitySee: Urban CO2 monitoring with sensors , 2012, 2012 Proceedings IEEE INFOCOM.

[12]  Kang G. Shin,et al.  Adaptive Subcarrier Nulling: Enabling partial spectrum sharing in wireless LANs , 2011, 2011 19th IEEE International Conference on Network Protocols.

[13]  Mingyan Liu,et al.  Online Learning in Decentralized Multiuser Resource Sharing Problems , 2012, ArXiv.

[14]  Suman Banerjee,et al.  Airshark: detecting non-WiFi RF devices using commodity WiFi hardware , 2011, IMC '11.

[15]  Xiang-Yang Li,et al.  Multi-Armed Bandits With Combinatorial Strategies Under Stochastic Bandits , 2013, ArXiv.

[16]  Xiang-Yang Li,et al.  ZIMO: building cross-technology MIMO to harmonize zigbee smog with WiFi flash without intervention , 2013, MobiCom.

[17]  Guoliang Xing,et al.  ZiFi: wireless LAN discovery via ZigBee interference signatures , 2010, MobiCom.