{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T11:06:18Z","timestamp":1775473578464,"version":"3.50.1"},"reference-count":34,"publisher":"Emerald","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12,20]]},"abstract":"<jats:p>Multi-hop is the current communication architecture of wireless mesh and ad hoc networks. Information is relayed from each source to its destination in successive transmissions between intermediate nodes. A major problem regarding this architecture is its poor performance at large system size: as the number of users in a wireless network increases, the communication rate for each user rapidly decreases. Can we design new communication architectures that significantly increase the capacity of large wireless networks?<\/jats:p>\n                  <jats:p>In this monograph, we present a scaling law characterization of the information-theoretic capacity of wireless networks, which sheds some light on this question. We show that the answer depends on the parameter range in which a particular network lies, namely the operating regime of the network. There are operating regimes where the information-theoretic capacity of the network is drastically higher than the capacity of conventional multi-hop. New architectures can provide substantial capacity gains here. We determine what these regimes are and investigate the new architectures that are able to approach the information-theoretic capacity of the network. In some regimes, there is no way to outperform multi-hop. In other words, the conventional multi-hop architecture indeed achieves the information-theoretic capacity of the network. We discuss the fundamental factors limiting the capacity of the network in these regimes and provide an understanding of why conventional multi-hop indeed turns out to be the right architecture.<\/jats:p>\n                  <jats:p>The monograph is structured as follows: In Section 2, we discuss the role of interference in wireless networks. We show that while current communication architectures are fundamentally limited by interference, new architectures based on distributed MIMO communication can overcome this interference limitation, yielding drastic performance improvements. Section 3 discusses the impact of power. We show that in power-limited regimes, distributed MIMO-based techniques are important not only because they remove interference but also because they provide received power gain. We identify the power-limited operating regimes of wireless networks and define the engineering quantities that determine the operating regime of a given wireless network. We show that unless the wireless network operates in a severely power-limited regime, distributed MIMO communication provides significant capacity gain over current techniques. Finally, in Section 4, we study how the area of the network, i.e., space, impacts the capacity of the network. This study enriches the earlier picture by adding new operating regimes where wireless networks can be moderately or severely spacelimited. We see that unless the network is severely limited in space, distributed-MIMO-based communication continues to provide drastic improvements over conventional multi-hop.<\/jats:p>","DOI":"10.1561\/1300000016","type":"journal-article","created":{"date-parts":[[2011,12,23]],"date-time":"2011-12-23T10:03:05Z","timestamp":1324634585000},"page":"1-107","source":"Crossref","is-referenced-by-count":14,"title":["Operating Regimes of Large Wireless Networks"],"prefix":"10.1561","volume":"5","author":[{"given":"Ayfer","family":"\u00d6zg\u00fcr","sequence":"first","affiliation":[{"name":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne, Facult\u00e9 Informatique et Communications , , 1015,","place":["Lausanne, Switzerland"]}]},{"given":"Olivier","family":"L\u00e9v\u00eaque","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, Department of EECS , , , 94720,","place":["Berkeley, CA, USA"]}]},{"given":"David","family":"Tse","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne, Facult\u00e9 Informatique et Communications , , 1015,","place":["Lausanne, Switzerland"]}]}],"member":"140","published-online":{"date-parts":[[2011,12,20]]},"reference":[{"issue":"6","key":"2026040605562170500_ref001","doi-asserted-by":"crossref","first-page":"2770","DOI":"10.1109\/TIT.2006.874533","article-title":"Outer bounds to the capacity region of wireless networks","volume":"52","author":"Ahmad","year":"2006","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026040605562170500_ref002","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801334","volume-title":"An Introduction to Random Matrices","author":"Anderson","year":"2009"},{"issue":"8","key":"2026040605562170500_ref003","doi-asserted-by":"crossref","first-page":"3425","DOI":"10.1109\/TIT.2008.926344","article-title":"Interference alignment and the degrees of freedom for the K-user interference channel","volume":"54","author":"Cadambe","year":"2008","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"2026040605562170500_ref004","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/TIT.1979.1056084","article-title":"Capacity theorems for the relay channel","volume":"25","author":"Cover","year":"1979","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2026040605562170500_ref005","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1002\/bltj.2015","article-title":"Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas","volume":"1","author":"Foschini","year":"1996","journal-title":"AT&T Bell Labs Tech. Journal"},{"issue":"3","key":"2026040605562170500_ref006","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1109\/TIT.2006.890791","article-title":"Closing the gap in the capacity of wireless networks via percolation theory","volume":"53","author":"Franceschetti","year":"2007","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"2026040605562170500_ref007","doi-asserted-by":"crossref","first-page":"3413","DOI":"10.1109\/TIT.2009.2023705","article-title":"The capacity of wireless networks: Information-theoretic and physical limits","volume":"55","author":"Franceschetti","year":"2009","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"2026040605562170500_ref008","doi-asserted-by":"crossref","first-page":"3425","DOI":"10.1109\/TIT.2009.2023681","article-title":"Hierarchical cooperation in ad hoc networks: Optimal clustering and achievable throughput","volume":"55","author":"Ghaderi","year":"2009","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2026040605562170500_ref009","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","article-title":"The capacity of wireless networks","volume":"42","author":"Gupta","year":"2000","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"2026040605562170500_ref010","doi-asserted-by":"crossref","first-page":"2555","DOI":"10.1109\/TIT.2004.836936","article-title":"Upper bounds to transport capacity of wireless networks","volume":"50","author":"Jovicic","year":"2004","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026040605562170500_ref011","volume-title":"Proceedings of the ACM SIGCOMM","author":"Katti","year":"2007"},{"issue":"9","key":"2026040605562170500_ref012","doi-asserted-by":"crossref","first-page":"3037","DOI":"10.1109\/TIT.2005.853304","article-title":"Cooperative strategies and capacity theorems for relay networks","volume":"51","author":"Kramer","year":"2005","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3\u20134","key":"2026040605562170500_ref013","first-page":"271","article-title":"Cooperative Communications","volume":"1","author":"Kramer","year":"2006","journal-title":"Foundations and Trends in Networking"},{"key":"2026040605562170500_ref014","volume-title":"Proceedings of the IEEE International Symposium on Information Theory (ISIT)","author":"Lee","year":"2008"},{"key":"2026040605562170500_ref015","volume-title":"Proceedings of the IEEE International Symposium on Information Theory (ISIT)","author":"Lee","year":"2010"},{"issue":"3","key":"2026040605562170500_ref016","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/TIT.2004.842576","article-title":"Information theoretic upper bounds on the capacity of large, extended ad-hoc wireless networks","volume":"51","author":"L\u00e9v\u00eaque","year":"2005","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"2026040605562170500_ref017","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/JSAC.2009.090602","article-title":"Bounds on the throughput gain of network coding in unicast and multicast wireless networks","volume":"27","author":"Liu","year":"2009","journal-title":"IEEE Transactions on Selected Areas in Communications"},{"key":"2026040605562170500_ref018","volume-title":"Proceedings of the IEEE International Symposium on Information Theory","author":"Nazer","year":"2009"},{"issue":"5","key":"2026040605562170500_ref019","doi-asserted-by":"crossref","first-page":"2889","DOI":"10.1109\/TIT.2011.2119690","article-title":"Interference alignment in dense wireless networks","volume":"57","author":"Niesen","year":"2011","journal-title":"IEEE Transactions on Information Theory"},{"issue":"9","key":"2026040605562170500_ref020","doi-asserted-by":"crossref","first-page":"3959","DOI":"10.1109\/TIT.2009.2025537","article-title":"On capacity scaling in arbitrary wireless networks","volume":"55","author":"Niesen","year":"2009","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"2026040605562170500_ref021","doi-asserted-by":"crossref","first-page":"2249","DOI":"10.1109\/TIT.2010.2043979","article-title":"The balanced unicast and multicast capacity regions of large wireless networks","volume":"56","author":"Niesen","year":"2010","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026040605562170500_ref022","volume-title":"Fundamental limits and optimal operation in large wireless networks","author":"\u00d6zg\u00fcr","year":"2009"},{"issue":"1","key":"2026040605562170500_ref023","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1109\/TIT.2009.2034819","article-title":"Information theoretic operating regimes of large wireless networks","volume":"56","author":"\u00d6zg\u00fcr","year":"2010","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"2026040605562170500_ref024","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/TIT.2009.2039165","article-title":"Throughput-delay tradeoff for hierarchical cooperation in ad hoc wireless networks","volume":"56","author":"\u00d6zg\u00fcr","year":"2010","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"2026040605562170500_ref025","doi-asserted-by":"crossref","first-page":"3573","DOI":"10.1109\/TIT.2007.904979","article-title":"Scaling laws for one and twodimensional random wireless networks in the low attenuation regime","volume":"53","author":"\u00d6zg\u00fcr","year":"2007","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"2026040605562170500_ref026","doi-asserted-by":"crossref","first-page":"3549","DOI":"10.1109\/TIT.2007.905002","article-title":"Hierarchical cooperation achieves optimal capacity scaling in ad-hoc networks","volume":"53","author":"\u00d6zg\u00fcr","year":"2007","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026040605562170500_ref027","volume-title":"Proceedings of the IEEE Information Theory and Applications Workshop","author":"\u00d6zg\u00fcr","year":"2010"},{"key":"2026040605562170500_ref028","volume-title":"Proceedings of the IEEE International Symposium on Information Theory","author":"\u00d6zg\u00fcr","year":"2009"},{"issue":"6","key":"2026040605562170500_ref029","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1002\/ett.4460100604","article-title":"Capacity of multi-antenna Gaussian channels","volume":"10","author":"Telatar","year":"1999","journal-title":"European Transactions on Telecommunications"},{"key":"2026040605562170500_ref030","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of Wireless Communication","author":"Tse","year":"2005"},{"issue":"5","key":"2026040605562170500_ref031","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1109\/TIT.2004.826631","article-title":"A network information theory for wireless communications: Scaling laws and optimal operation","volume":"50","author":"Xie","year":"2004","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"2026040605562170500_ref032","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1109\/TIT.2006.874519","article-title":"On the path-loss attenuation regime for positive cost and linear scaling of transport capacity in wireless networks","volume":"52","author":"Xie","year":"2006","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"2026040605562170500_ref033","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/TIT.2004.842628","article-title":"The transport capacity of wireless networks over fading channels","volume":"51","author":"Xue","year":"2005","journal-title":"IEEE Transactions on Information Theory"},{"key":"2026040605562170500_ref034","volume-title":"Proceedings of the ACM MobiCom","author":"Zhang","year":"2006"}],"container-title":["Foundations and Trends\u00ae in Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftnet\/article-pdf\/5\/1\/1\/11135888\/1300000016en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftnet\/article-pdf\/5\/1\/1\/11135888\/1300000016en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T09:56:34Z","timestamp":1775469394000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftnet\/article\/5\/1\/1\/1331348\/Operating-Regimes-of-Large-Wireless-Networks"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,20]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12,20]]}},"URL":"https:\/\/doi.org\/10.1561\/1300000016","relation":{},"ISSN":["1554-057X","1554-0588"],"issn-type":[{"value":"1554-057X","type":"print"},{"value":"1554-0588","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12,20]]}}}