Skip to main content Accessibility help
×
Hostname: page-component-84b7d79bbc-rnpqb Total loading time: 0 Render date: 2024-07-28T22:19:23.549Z Has data issue: false hasContentIssue false

1 - Introduction

Published online by Cambridge University Press:  05 May 2015

Rahul Vaze
Affiliation:
Tata Institute of Fundamental Research, Mumbai
Get access

Summary

Introduction

Wireless networks can be broadly classified into two categories: centralized and de-centralized. A canonical example of a centralized network is a cellular network, where all operations are controlled by basestations, for example, when should each user transmit or receive, thereby avoiding simultaneous transmission (interference) by closely located nodes. Prominent examples of de-centralized or ad hoc networks include sensor or military networks. Sensor network is deployed in a large physical area to either monitor physical parameters, such as temperature, rainfall, and animal census, or intrusion detection. In a military network, a large number of disparate military equipment, e.g., battle tanks, helicopters, ground forces, is connected in a decentralized manner to form a robust and high throughput network. Ad hoc networks are attractive because of their scalability, self-configurability, robustness, etc.

Vehicular network is a more modern example of an ad hoc wireless network, where a large number of sensors are deployed on the highways as well as mounted on vehicles that are used for traffic management, congestion control, and quick accident information exchange. Many other applications of ad hoc wireless networks are also envisaged such as deploying large number of sensors in large building for helping fire fighters in case of fire emergency and in case of earthquakes.

The key feature that distinguishes centralized and ad hoc wireless networks is interference. With centralized control, interference can be avoided in contrast to ad hoc networks, where there is no mechanism of inhibiting multiple transmitters from being active simultaneously. Thus, ad hoc networks give rise to complicated signal interaction at all receiver nodes. As compared to additive noise, interference is structured, and treating interference as noise is known to be sub-optimal. Thus, performance analysis of ad hoc wireless networks is far more complicated than centralized wireless networks.

In this book, we are interested in studying the physical layer issues of ad hoc wireless networks, such as finding the limits on the reliable rate of information transfer and ensuring connectivity among all nodes of the network.

Type
Chapter
Information
Random Wireless Networks
An Information Theoretic Perspective
, pp. 1 - 11
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] S., Weber, X., Yang, J., Andrews, and G., de Veciana. 2005. “Transmission capacity of wireless ad hoc networks with outage constraints.”IEEE Trans. Inf. Theory 51 (12): 4091–102.Google Scholar
[2] P., Gupta and P., Kumar. 2000. “The capacity of wireless networks.”IEEE Trans. Inf. Theory 46 (2): 388–04.Google Scholar
[3] V., Tarokh, H., Jafarkhani, and A., Calderbank. 1999. “Space-time block coding for wireless communications: Performance results.”IEEE J. Sel. Areas Commun. 17 (3): 451–60.Google Scholar
[4] Robert W., Heath. 2008. Introduction to Wireless Digital Communication: A Signal Processing Perspective.
[5] C. E., Shannon. 2001. “A mathematical theory of communication.”ACM SIGMOBILE Mobile Computing and Communications Review 5 (1): 3–55.Google Scholar
[6] T., Cover and J., Thomas. 2004. Elements of Information Theory. John Wiley and Sons.
[7] E., Telatar. 1999. “Capacity of multi-antenna gaussian channels.”European Trans. on Telecommunications 10 (6): 585–95.Google Scholar
[8] V., Garg. 2010. Wireless Communications & Networking. Morgan Kaufmann.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Introduction
  • Rahul Vaze
  • Book: Random Wireless Networks
  • Online publication: 05 May 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316182581.002
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Introduction
  • Rahul Vaze
  • Book: Random Wireless Networks
  • Online publication: 05 May 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316182581.002
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Introduction
  • Rahul Vaze
  • Book: Random Wireless Networks
  • Online publication: 05 May 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316182581.002
Available formats
×