HKUST Library Institutional Repository Banner

HKUST Institutional Repository >
Computer Science and Engineering >
CSE Conference Papers >

Please use this identifier to cite or link to this item:
Title: Scaling laws on multicast capacity of large scale wireless networks
Authors: Wang, Cheng
Li, Xiang-Yang
Jiang, Changjun
Tang, Shaojie
Liu, Yunhao
Zhao, Jizhong
Keywords: Multicast capacity
Wireless ad hoc networks
Random networks
Achievable throughput
Issue Date: Apr-2009
Citation: Proceedings IEEE INFOCOM 2009. The 28th Conference on Computer Communications, Rio de Janeiro, Brazil, 19-25 April 2009, p. 1863-1871.
Abstract: In this paper, we focus on the networking-theoretic multicast capacity for both random extended networks (REN) and random dense networks (RDN) under Gaussian Channel model, when all nodes are individually power-constrained. During the transmission, the power decays along path with the attenuation exponent α > 2. In REN and RDN, n nodes are randomly distributed in the square region with side-length √n and 1, respectively. We randomly choose ns nodes as the sources of multicast sessions, and for each source v, we pick uniformly at random nd nodes as the destination nodes. Based on percolation theory, we propose multicast schemes and analyze the achievable throughput by considering all possible values of ns and nd. As a special case of our results, we show that for ns = Θ(n), the per-session multicast capacity of RDN is Θ(1/√ndn) when nd = Ο(n/(log n)3) and is Θ(1/n) when nd = Ω(n/log n); the per-session multicast capacity of REN is Θ(1/√ndn) when nd = Ο(n/(log n) α+1) and is Θ(1/nd·(log n)-α/2) when nd = Ω(n/log n).
Rights: © 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder
Appears in Collections:CSE Conference Papers

Files in This Item:

File Description SizeFormat
scal.pdf304KbAdobe PDFView/Open

All items in this Repository are protected by copyright, with all rights reserved.