Please use this identifier to cite or link to this item:

Scaling laws on multicast capacity of large scale wireless networks

Authors Wang, C. HKUST affiliated (currently or previously)
Li, X.Y.
Jiang, C.
Tang, S.
Liu, Y. View this author's profile
Zhao, J.
Issue Date 2009
Source Proceedings - IEEE INFOCOM , 2009, p. 1863-1871
Summary In this paper, we focus on the networking-theoretic multicast capacity for both random extended networks (REN) and random dense networks (RDN) under Gaussian Channel model, when all nodes are individually power-constrained. During the transmission, the power decays along path with the attenuation exponent α > 2. In REN and RDN, n nodes are randomly distributed in the square region with side-length √n and 1, respectively. We randomly choose nB nodes as the sources of multicast sessions, and for each source v, we pick uniformly at random nd nodes as the destination nodes. Based on percolation theory, we propose multicast schemes and analyze the achievable throughput by considering all possible values of ns and nd · As a special case of our results, we show that for n s = Θ(n), the per-session multicast capacity of RDN is Θ Equation Persented when nd = O Equation Persented and is Θ(1/n) when nd = Ω Equation Persented the per-session multicast capacity of REN is Θ Equation Persented when nd = O Equation Persented and is Θ Equation Persented when nd = Ω Equation Persented. © 2009 IEEE.
ISSN 0743-166X
Rights © 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder
Language English
Format Conference paper
Access View full-text via DOI
View full-text via Scopus
Files in this item:
File Description Size Format
scal.pdf 311389 B Adobe PDF