Display language
To modulepage Generate PDF

#40236 / #1

SS 2015 - WS 2017/18

English

Wireless Network Analysis and Optimization

6

Stanczak, Slawomir

benotet

Mündliche Prüfung

Zugehörigkeit


Fakultät IV

Institut für Telekommunikationssysteme

34331800 FG Netzwerk- und Informationstheorie

No information

Kontakt


HFT 6

Stanczak, Slawomir

slawomir.stanczak@tu-berlin.de

Learning Outcomes

After completion of this module students have the ability to model modern wireless communication systems and optimize them based on these models. In addition, they are able to understand the complex couplings and dependencies between different parameters in such systems. We will introduce the basic methods for cross-layer design along with corresponding algorithms and optimization techniques. The topics included are necessary to understand modern applications such as communications and anomaly detection in sensor networks. Data security and integrity is one of the fundamental requirements in todays networks. The module introduces information-theoretic foundations of Physical Layer Security as well as the extensions needed in network communication context along with the required algorithmic methods which is a promising new method for achieving unconditional security, i.e. it is not based on assumption that certain mathematical problems have no efficient solution . The potential applications include for example The Internet of Things and Low Latency Secure Communications.

Content

- Axiomatic framework for interference modeling, existence and uniqueness of fixed points, fixed-point algorithms, applications of standard interference functions - Theoretical framework for resource allocation and interference management (feasibility re- gions, network utility maximization, QoS support, convexity issues, proportional fairness, max-min fairness, efficiency versus fairness trade-off) - Centralized and decentralized algorithmic solutions for joint power control and beamforming with and without QoS requirements. - Noiseles Network Coding: Max-Flow-Min-Cut-Theorem (MFMC-Theorem) for Digraphs and related algorithms, linear network codes, algorithms for achieving the bound from MFMC-Theorem with linear network codes - Network Coding in noisy wireless networks : Communication over Relays , distributed computation over noisy channels - Basics of Physical Layer Security: attack models, Wiretap channel, strong/weak secrecy, methods of encryption - Physical Layer Security in wireless networks: Optimal communication scenarios in presence of active/passive wiretappers and untrusted Relays, distributed computation for secrecy, characterization and computing of secrecy regions

Module Components

Pflichtgruppe:

All Courses are mandatory.

Course NameTypeNumberCycleLanguageSWSVZ
Selected topics in wireless network optimizationVLWiSeNo information2
Wireless Network Analysis and OptimizationVLSoSeNo information2

Workload and Credit Points

Selected topics in wireless network optimization (VL):

Workload descriptionMultiplierHoursTotal
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)

Wireless Network Analysis and Optimization (VL):

Workload descriptionMultiplierHoursTotal
Präsenzzeit15.02.0h30.0h
Vor-/Nachbereitung15.04.0h60.0h
90.0h(~3 LP)
The Workload of the module sums up to 180.0 Hours. Therefore the module contains 6 Credits.

Description of Teaching and Learning Methods

The module consists of conventional frontal teaching in class, developing theoretical and mathematical concepts, and a semester project where students work, possibly in groups, and are assigned a research paper in the area of wireless network optimization to read, understand, and prepare a talk.

Requirements for participation and examination

Desirable prerequisites for participation in the courses:

Prerequisite for participation to courses are a mathematical background at the level of beginning MS students in Electrical Engineering (signals and systems, linear algebra and notions of matrix theory). The course is open to students enrolled in any MSc in EE CS, Mathematics and Physics.

Mandatory requirements for the module test application:

This module has no requirements.

Module completion

Grading

graded

Type of exam

Oral exam

Language

English

Duration/Extent

No information

Duration of the Module

The following number of semesters is estimated for taking and completing the module:
2 Semester.

This module may be commenced in the following semesters:
Winter- und Sommersemester.

Maximum Number of Participants

This module is not limited to a number of students.

Registration Procedures

Course teaching and organization (not module examination enrollment at Examination office/Prüfungsamt) is supported by an ISIS course. Registration details are provided at the beginning of the module.

Recommended reading, Lecture notes

Lecture notes

Availability:  unavailable

 

Electronical lecture notes

Availability:  unavailable

 

Literature

Recommended literature
Bloch and Barros, Physical-Layer Security: From Information Theory to Security Engineering, Cambridge University Press, 2011
Medard and Sprintson, Network Coding: Fundamentals and Applications, 2010
Stanczak, Wiczanowski and Boche, Fundamentals of Resource Allocation in Wireless Networks: Theory and Algorithms, Springer 2009

Assigned Degree Programs


This module is used in the following Degree Programs (new System):

Studiengang / StuPOStuPOsVerwendungenErste VerwendungLetzte Verwendung
This module is not used in any degree program.

Students of other degrees can participate in this module without capacity testing.

Miscellaneous

No information