2017
DOI: 10.1109/tmc.2016.2614979
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic Network Decoupling with Virtual Full-Duplex Operation in Multi-Source Interfering Relay Networks

Abstract: We introduce a new achievability scheme, termed opportunistic network decoupling (OND), operating in virtual full-duplex mode. In the scheme, a novel relay scheduling strategy is utilized in the K × N × K channel with interfering relays, consisting of K source-destination pairs and N half-duplex relays in-between them. A subset of relays using alternate relaying is opportunistically selected in terms of producing the minimum total interference level, thereby resulting in network decoupling. As our main result,… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 43 publications
0
11
0
Order By: Relevance
“…Remark 2: We also show an upper bound on DoF total by using the cut-set bound argument similarly as in the singleantenna OND protocol [34,Section 4]. Suppose thatÑ relay nodes are active, whereÑ ∈ {1, 2, · · · , N }.…”
Section: Proof a Lower Bound On The Achievablementioning
confidence: 99%
See 1 more Smart Citation
“…Remark 2: We also show an upper bound on DoF total by using the cut-set bound argument similarly as in the singleantenna OND protocol [34,Section 4]. Suppose thatÑ relay nodes are active, whereÑ ∈ {1, 2, · · · , N }.…”
Section: Proof a Lower Bound On The Achievablementioning
confidence: 99%
“…By applying opportunism to cooperative communications, various techniques such as opportunistic two-hop relaying [29], [30] and opportunistic routing [31], [32], [33] were investigated. As for the K × N × K channel having interfering relay nodes, opportunistic network decoupling (OND) was recently proposed while showing that K DoF is asymptotically achieved even in the presence of inter-relay interference when N is beyond a certain value [34]. In the OND protocol, two sets of relay nodes are selected among total N relay candidates to alternatively receive signals from source nodes or forward signals to destination nodes in each time slot, thus realizing the virtual full-duplex mode.…”
Section: Previous Workmentioning
confidence: 99%
“…The total number of endangered, threatened, and extinct species in the Hawaiian Islands of the United States has accounted for 49.4% of the total number of plant species in the island. Thus, protecting rare plants has become a common concern among researchers in various industries around the world [ 5 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…As the special variants of delay tolerant networks (DTNs) [14] and mobile ad hoc networks (MANETs) [15], opportunistic networks have to undergo the intermittent and unstable communication connectivity in the data dissemination process [16]. As a sequence, the data transmission process in opportunistic networks usually executes the 'store-carry-forward' mechanism [17], indicating that message carriers with data information randomly move to the communication areas of the peers, select the suitable relay nodes from its neighbors and transmit data packets to them via short-range wireless communication technologies such as Bluetooth or Wi-Fi [18]. A concrete example of opportunistic networks is a disaster relief area with destroyed communication infrastructures in which rescuers walk around with smart phones and try to search for victims via wireless or Wi-Fi technologies [19].…”
Section: Introductionmentioning
confidence: 99%