Scaling Laws on Multicast Capacity of Large Scale Wireless Networks

被引:8
|
作者
Wang, Cheng [1 ]
Li, Xiang-Yang [2 ]
Jiang, Changjun [1 ]
Tang, Shaojie [2 ]
Liu, Yunhao [3 ]
Zhao, Jizhong [4 ]
机构
[1] Tongji Univ, Dept Comp Sci & Technol, Shanghai 200092, Peoples R China
[2] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[3] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Peoples R China
[4] Xi An Jiao Tong Univ, Dept Comp Sci & Technol, Xian, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Multicast Capacity; Percolation; Wireless ad hoc networks; Random networks; Achievable throughput; AD-HOC NETWORKS;
D O I
10.1109/INFCOM.2009.5062107
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we focus on the networking-theoretic multicast capacity for both random extended networks (REN) and random dense networks (RDN) under Gaussian Channel model, when all nodes are individually power-constrained. During the transmission, the power decays along path with the attenuation exponent alpha > 2. In REN and RDN, n nodes are randomly distributed in the square region with side-length root n and 1, respectively. We randomly choose n. nodes as the sources of multicast sessions, and for each source v, we pick uniformly at random n(d) nodes as the destination nodes. Based on percolation theory, we propose multicast schemes and analyze the achievable throughput by considering all possible values of n(s) and n(d). As a special case of our results, we show that for n(s) = Theta(n), the per-session multicast capacity of RDN is Theta(1/root n(d) n) when n(d) = O(n/(log n)(3)) and is Theta(1/n) when n(d) = Omega(n/log n); the per-session multicast capacity of RFN is Theta(1/root n(d) n) when n(d) = O(n/(log n)(alpha+1)) and is Theta(1/n(d) . (log n)(-alpha/2)) when n(d) = Omega(n/log n).
引用
收藏
页码:1863 / +
页数:3
相关论文
共 50 条
  • [21] Connectivity Scaling Laws in Wireless Networks
    Coon, Justin P.
    Georgiou, Orestis
    Dettmann, Carl P.
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (06) : 629 - 632
  • [22] Scaling laws for capacity and delay in wireless ad hoc networks with random mobility
    Sharma, G
    Mazumdar, RR
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3869 - 3873
  • [23] Capacity Scaling Laws for Underwater Networks
    Lucani, Daniel E.
    Medard, Muriel
    Stojanovic, Millca
    [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 2125 - +
  • [24] Achievable Capacity Scaling Laws of Three-Dimensional Wireless Social Networks
    Wei, Zhiqing
    Wu, Huici
    Yuan, Xin
    Huang, Sai
    Feng, Zhiyong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (03) : 2671 - 2685
  • [25] Scaling Laws for the Ergodic Capacity of Hybrid Wireless Networks with Distributed Base Stations
    Li, Zhuo
    Liang, Qilian
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [26] Capacity Scaling Laws of Information Dissemination Modalities in Wireless Ad Hoc Networks
    Wang, Zheng
    Sadjadpour, Hamid R.
    Garcia-Luna-Aceves, J. J.
    [J]. 2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1169 - +
  • [27] Capacity Scaling Laws for Underwater Networks
    Lucani, Daniel E.
    Medard, Muriel
    Stojanovic, Milica
    [J]. INTERNET MATHEMATICS, 2013, 9 (2-3) : 241 - 264
  • [28] Capacity of Large-scale CSMA Wireless Networks
    Chau, Chi-Kin
    Chen, Minghua
    Liew, Soung Chang
    [J]. FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009), 2009, : 97 - 108
  • [29] Capacity of Large-Scale CSMA Wireless Networks
    Chau, Chi-Kin
    Chen, Minghua
    Liew, Soung Chang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (03) : 893 - 906
  • [30] Secrecy Capacity Scaling of Large-Scale Cognitive Networks
    Chen, Yitao
    Zhang, Jinbei
    Wang, Xinbing
    Tian, Xiaohua
    Wu, Weijie
    Wu, Fan
    Tan, Chee Wei
    [J]. MOBIHOC'14: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2014, : 125 - 134