{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:30:24Z","timestamp":1744173024054,"version":"3.40.3"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T00:00:00Z","timestamp":1347926400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2012,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The most successful achievable schemes for ad hoc wireless networks are those based on establishing cooperative multiple-input and multiple-output links. In this article, we analyze one of the important design parameters of such schemes, namely the number of quantization bits. Due to the digital architecture of these schemes, the received signal at nodes should become quantized before further processing. The scheme\u2019s aggregate throughput highly depends on the resolution of the quantization process. We demonstrate that there is an optimum number of quantization bits which maximizes the network throughput. We show that the optimum number of quantization bits scales as<jats:italic>\u03b2<\/jats:italic>log<jats:sub>2<\/jats:sub>(SNR), for any strictly positive<jats:italic>\u03b2<\/jats:italic>independent of SNR, for the high SNR regime. Furthermore, we derive the optimum scaling of network throughput in such a regime. It is concluded that a good management of the number of quantization bits as a design parameter has a significant impact on the network performance.<\/jats:p>","DOI":"10.1186\/1687-1499-2012-290","type":"journal-article","created":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T12:14:32Z","timestamp":1347970472000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of quantization effects on the performance of cooperative MIMO techniques in wireless networks"],"prefix":"10.1186","volume":"2012","author":[{"given":"Seyed Pooya","family":"Shariatpanahi","sequence":"first","affiliation":[]},{"given":"Babak Hossein","family":"Khalaj","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Shah-Mansouri","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Del Ser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,18]]},"reference":[{"key":"530_CR1","doi-asserted-by":"crossref","first-page":"pp. 66","DOI":"10.1145\/938985.938993","volume-title":"Paper presented at the Annual International Conference on Mobile Computing and Networking (MobiCom) (ACM)","author":"K Jain","year":"2003","unstructured":"Jain K, Padhye J, Padmanabhan V, Qiu L: Impact of interference on multi-hop wireless network performance. In Paper presented at the Annual International Conference on Mobile Computing and Networking (MobiCom) (ACM). San Diego, California; 2003:pp. 66-80."},{"issue":"4","key":"530_CR2","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1109\/TIT.2008.917663","volume":"54","author":"R Madan","year":"2008","unstructured":"Madan R, Shah D, Leveque O: Product multicommodity flow in wireless networks. IEEE Trans. Inf. Theory 2008, 54(4):1460-1476.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"530_CR3","doi-asserted-by":"crossref","first-page":"pp. 159","DOI":"10.1109\/ITW.2004.1405292","volume-title":"Paper presented at the IEEE Information Theory Workshop (ITW)","author":"C Peraki","year":"2004","unstructured":"Peraki C, Servetto SD: Capacity stabilityflows in large-scale random networks. In Paper presented at the IEEE Information Theory Workshop (ITW). San Antonio, Texas; 2004:pp. 159-164."},{"issue":"2","key":"530_CR4","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/18.825799","volume":"42","author":"P Gupta","year":"2000","unstructured":"Gupta P, Kumar PR: The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 42(2):388-404.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"530_CR5","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1109\/TIT.2006.890791","volume":"53","author":"M Franceschetti","year":"2007","unstructured":"Franceschetti M, Dousse O, Tse DNC: Closing the gap in the capacity of wireless networks via percolation theory. IEEE Trans. Inf. Theory 2007, 53(3):1009-1018.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"530_CR6","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1109\/TIT.2004.828055","volume":"50","author":"SR Kulkarni","year":"2004","unstructured":"Kulkarni SR, Viswanath P: A deterministic approach to throughput scaling in wireless networks. IEEE Trans. Inf. Theory 2004, 50(6):1041-1049. 10.1109\/TIT.2004.828055","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"530_CR7","doi-asserted-by":"publisher","first-page":"2568","DOI":"10.1109\/TIT.2006.874379","volume":"52","author":"A El Gamal","year":"2006","unstructured":"El Gamal A, Mammen J, Prabhakar B, Shah D: Optimal throughput-delay scaling in wireless networks\u2014Part: I the fluid model. IEEE Trans. Inf. Theory 2006, 52(6):2568-2592.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"530_CR8","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1109\/TIT.2007.896858","volume":"53","author":"S Aeron","year":"2007","unstructured":"Aeron S, Saligrama V: Wireless ad hoc networks: strategies and scaling laws for the fixed SNR regime. IEEE Trans. Inf. Theory 2007, 53(6):2044-2059.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"530_CR9","doi-asserted-by":"publisher","first-page":"3549","DOI":"10.1109\/TIT.2007.905002","volume":"53","author":"A \u00d6zg\u00fcr","year":"2007","unstructured":"\u00d6zg\u00fcr A, L\u00e9v\u00eaque O, Tse D: Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks. IEEE Trans. Inf. Theory 2007, 53(10):3549-3572.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"530_CR10","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1109\/TIT.2009.2023681","volume":"55","author":"J Ghaderi","year":"2009","unstructured":"Ghaderi J, Xie L-L, Shen X: Hierarchical cooperation in ad hoc networks: optimal clustering and achievable throughput. IEEE Trans. Inf. Theory 2009, 55(8):3425-3436.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"530_CR11","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TIT.2009.2039165","volume":"56","author":"A \u00d6zg\u00fcr","year":"2010","unstructured":"\u00d6zg\u00fcr A, L\u00e9v\u00eaque O: Throughput-delay tradeoff for hierarchical cooperation in ad hoc wireless networks. IEEE Trans. Inf. Theory 2010, 56(3):1369-1377.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"530_CR12","volume-title":"IEEE Trans. Inf. Theory (submitted) (2008)","author":"L-L Xie","year":"2009","unstructured":"Xie L-L: On information-theoretic scaling laws for wireless networks. IEEE Trans. Inf. Theory (submitted) (2008) Revised, July 2009. available at http:\/\/arxiv.org\/abs\/0809.1205"},{"key":"530_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1008328.1008329","volume":"8","author":"DE Knuth","year":"1976","unstructured":"Knuth DE: Big omicron and big omega and big theta. ACM SIGACT News 1976, 8: 18-24. 10.1145\/1008328.1008329","journal-title":"ACM SIGACT News"},{"key":"530_CR14","volume-title":"Elements of Information Theory","author":"T Cover","year":"2006","unstructured":"Cover T, Thomas JA: Elements of Information Theory. Wiley Series in Telecommunications and Signal Processing, New York, NY; 2006."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-290.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2012-290\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-290.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T23:56:10Z","timestamp":1744156570000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2012-290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,18]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["530"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2012-290","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2012,9,18]]},"assertion":[{"value":"13 April 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2012","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2012","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"290"}}