• 沒有找到結果。

Multicast Scaling Law in Multichannel Multiradio Wireless Networks

N/A
N/A
Protected

Academic year: 2022

Share "Multicast Scaling Law in Multichannel Multiradio Wireless Networks"

Copied!
11
0
0

加載中.... (立即查看全文)

全文

(1)

Multicast Scaling Law in Multichannel Multiradio Wireless Networks

Luoyi Fu and Xinbing Wang

Abstract—This paper addresses the issue of multicast scaling performance in multichannel multiradio (MC-MR) networks. Under the assumption of both limited bandwidth and node tunability, a total fixed bandwidth W is equally split into c channels with 0 < m c interfaces equipped on each node for channel switching. The network contains totally n nodes, each serving as a source with k randomly and uniformly selected destinations. We try to give a comprehensive picture of multicast scalings by investigating both the static and mobile networks, with the metrics being capacity and delay. Previous literature [9] has indicated that unicast capacity is solely determined by the ratio of channels to interfaces c=m in MC-MR networks. However, in multicast our problem is made more complicated by the interplay among k, c=m and node mobility (if considered in mobile scenario). We characterize their impact on multicast scaling and obtain three remarkable findings from our results. First, we find capacity loss exists in static networks even if the ratio c=m¼ Oðlog nÞ (We use the following notation throughout our paper: fðnÞ ¼ OðgðnÞÞ , lim supn!1fðnÞ

gðnÞ<1, fðnÞ ¼ ðgðnÞÞ , lim infn!1fðnÞ gðnÞ<1, fðnÞ ¼ ðgðnÞÞ , fðnÞ ¼ OðgðnÞÞ and gðnÞ ¼ OðfðnÞÞ, fðnÞ ¼ eðÞ: The corresponding order ðÞ which contains a logarithmic order.) when k is close to ðnÞ. This differs from unicast that is free of capacity loss as long as c=m ¼ Oðlog nÞ. Second, mobility is manifested to improve multicast capacity in MC-MR networks, where two major capacity bottlenecks, i.e., connectivity and interference constraints, in static networks can be effectively broken. Third, a largely reduced delay is possible by simply seeking for multichannel reuse in 2-hop algorithm without redundancy. This even outperforms the delay scaling in single channel framework [26], where a delay smaller than

ffiffiffiffiffiffiffiffiffiffiffiffiffiffi n log k

p Þ is not achievable even with more than ð ffiffiffiffiffiffiffiffiffiffiffiffiffiffi n log k

p Þ relay nodes involved in 2-hop mode. As a high-level summary of our results, our work discloses analytically where the performance improvement and degradation exhibit in MC-MR networks, meanwhile unifying the previous bounds on unicast (setting k¼ 1) in [9].

Index Terms—Multicast, multichannel multiradio, scaling

Ç 1 I

NTRODUCTION

T

HE availability of multiple unlicensed spectral bands has recently spawn intense interest in exploiting multiple channels in wireless networks [1], 2], [3], [4], [5], [6], [7]. The capacity of such networks has also been studied under various assumptions on availability/cap- ability of radio interfaces. A corresponding landmark work dates back to year 2000, when Gupta and Kumar [8]

indicated that for a single-channel single-interface scenar- io, in a randomly deployed network, per-flow capacity scales as ðW = ffiffiffiffiffiffiffiffiffiffiffiffiffiffi

n log n

p Þ under protocol interference model. And the capacity scaling remains the same even when the total bandwidth W available is divided into c channels, provided that each node is also equipped with one dedicated interface per channel.

Although many existing standards, for example, IEEE 802.11a, 802.11b, and 802.15.4 allow for multiple channels, nodes are typically hardware constrained and have much fewer interfaces. This problem was addressed in [9], under the assumption of c available channels with bandwidth of W =c for each and 1  m  c interfaces per node. Interest-

ingly, the finding implied that the corresponding capacity depends solely on the ratio c=m, as long as nodes are capable of switching their interface(s) to any channel.

Following this, and motivated on the basis of future low- cost transceiver designs involving limited tunability, Bhandari and Vaidya [10], [11] attempted to quantify the impact of switching constraints on capacity performance.

Particularly, their investigation was under random ðc; fÞ assignment, where each node is preassigned a random subset of f channels out of c and may only switch on these. Another relevant body of work includes seeking for the way of capacity enhancement in multichannel multi- radio (MC-MR) scenario, either through using directional antenna [12] or power exploitation [13].

All previous works in MC-MR networks [9] [10], [11], [12], [13] merely characterize capacity scaling for unicast.

However, multicast traffic is appearing to be more pre- dominant in many applications such as Battlefield net- works, disaster management scenarios and online video viewing, and so on. So far a plethora of literatures have investigated multicast capacity under a wide variety of network settings, such as static networks, mobile ad hoc networks, hybrid networks, hierarchically cooperative net- works and clustered networks, and so on, but all confined to the single channel framework. It remains unclear how multicast performs if operated in multichannel networks.

Also note that all the analysis of [9], [10], [11], [12], [13] is restricted to static networks whereas most realistic traces demonstrate that nodes (users) are usually moving around different areas rather than staying static. All these facts, on one hand, suggest it is essential to measure multicast performance in a more general multichannel framework

. The authors are with the Department of Electronic Engineering, Shanghai Jiao Tong University, Room 301A, No. 5 SEIEE Building, 800 Dong Chuan Road, Shanghai 200240, China.

E-mail: {yiluofu, xwang8}@sjtu.edu.cn.

Manuscript received 15 May 2012; revised 8 Nov. 2012; accepted 17 Nov.

2012; published online 12 Dec. 2012.

Recommended for acceptance by L.E. Li.

For information on obtaining reprints of this article, please send e-mail to:

tpds@computer.org, and reference IEEECS Log Number TPDS-2012-05-0463.

Digital Object Identifier no. 10.1109/TPDS.2012.334.

1045-9219/13/$31.00 ß 2013 IEEE Published by the IEEE Computer Society

(2)

from a more comprehensive perspective, not simply limited to capacity metric and the static scenario; on the other hand, they pose a notable challenge on multicast analysis, which is made more complicated by the interplay among multiple receivers requesting for the same information, channel assignment, and node mobility.

That motivates us to study mulitcast scaling law of MC-MR networks in this paper. We mainly focus on the bandwidth-limited case where a total fixed bandwidth is available for supporting small data rate equally distrib- uted to multiple channels. And the results can be easily extended to the environment where new channels are created by utilizing additional frequency spectrum. We address the challenge by first focusing on static networks as the startpoint and then turning our attention to mobile case for further investigation. Precisely speaking, our major contributions are threefold. First, we characterize the capacity region in static network, with regard to the impact of both the number of destinations k per multicast session and the channel/interface ratio c=m. Second, we present a first look into the multicast scaling under mobile MC-MR networks, deriving the maximum capacity that can be achieved as well as the corresponding delay. Third, we establish efficient routing in both static and mobile scenarios to reach the capacity bounds obtained.

Specifically, some significant and interesting findings are also obtained from our results, which are briefly outlined as follows:

. In static multicast MC-MR network, there exists capacity loss even if the ratio c=m ¼ Oðlog nÞ, given that k is close to the total number of nodes n (except for a polylogarithmic factor). This differs from the unicast traffic that does not suffer from capacity loss as long as c=m ¼ Oðlog nÞ. Additionally, extra capacity loss will be incurred by k in the range c=m¼ ðlog nÞ and c=m ¼ OðnÞ, when k is larger than ðcmnÞ (except for a polylogarithmic factor).

. We find capacity improvement for multicast when mobility is introduced into MC-MR networks. In particular, mobility improves the capacity regions exhibited under c=m ¼ OðnÞ to ðnmckÞ (except for a polylogarithmic factor). The benefit stems from the fact that both the connectivity and interference bottlenecks can be broken through node mobility whereas they construct the main obstacles for capacity upper bound in static networks.

. In mobile MC-MR networks, delay can be largely reduced through frequency reuse without seeking for redundancies. This renders us a new perspective of improving delay other than solely relying on relay nodes, as is commonly adopted in conventional single channel framework. Surprisingly, the result even fills in the blank in single channel MANETs, where a delay smaller than ð ffiffiffiffiffiffiffiffiffiffiffiffiffiffi

n log k

p Þ in two-hop scheme is not achievable even with more than

ðpffiffiffiffiffiffiffiffiffiffiffiffiffiffin log k

Þ relays introduced.

We note this paper is not merely a generalization and an extension of results from previous works. Our work shows the fact that MC-MR is a handicap to multicast performance scaling in static networks, but brings about potential benefits in mobile cases. Such insight is fundamental and

delivers useful twofold directions to us: we should address major concern with the obstacles that will be encountered in real network design and meanwhile take advantage of the network architecture for performance enhancement.

The roadmap of this paper is as follows: Section 2 lists literature review of some existing scaling law analysis in single-channel single-radio (SC-SR) framework. We intro- duce the network model and list the definitions in Section 3.

The main results of this paper are briefly introduced in Section 4. We give detailed analysis of multicast scaling in Sections 5 and 6. Section 7 is contributed to some discussion on our results and their implications. We conclude the paper in Section 8.

2 R

ELATED

W

ORKS

Scaling law analysis has for long been under intensive study within the networking research community. A flurry of theoretical studies target for large-scale ad hoc networks where the number of nodes can go to infinity. The seminal work of asymptotic capacity study is initiated by Gupta and Kumar [8], who show that the maximal per-node unicast throughput achievable in wireless networks is

ð1= ffiffiffiffiffiffiffiffiffiffiffiffiffiffi n log n

p Þ for a uniformly distributed destination.

Grossglauser and Tse [14] later introduce mobility to the nodes and show that by employing a store-carry-forward paradigm, capacity can be improved to ð1Þ, at the expense of increased delay. Neely and Modiano [15] further demonstrate that there exists a tradeoff between capacity and delay. A series of works [16], [17], [18], [19], [20], [21], [22], [23] have then followed, focusing on the analysis of throughput-delay tradeoffs under different mobility scenar- ios, through either the carry-and-forward mode [16], [17], [18], coding techniques [19], [20], [21], or infrastructure support [22], [23].

Multicast capacity is also under extensive study in the literature recently. Li [24] studies the multicast capacity in wireless networks of side length a, with n nodes randomly deployed in it. Their analytical results claim that the per- flow multicast capacity (of n multicast flows, each flow with k destinations) is ð1= ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi

nk log n

p Þ when k ¼ Oðn= log nÞ and ð1=nÞ when k ¼ ðn= log nÞ. Later on, Li et al. [25]

extend multicast analysis to a more general interference model, say, Gaussian channel model, and derive the capacity from the perspective of percolation theorem. Wang et al. [26] further consider multicast capacity in mobile networks, presenting capacity-delay tradeoffs under differ- ent routing schemes.

The numerous papers under Gupta and Kumar’s framework are mostly based on SC-SR networks for scaling law investigation. With more unlicensed spectrum available, we anticipate to take a look into the scaling performance in multichannel situations. Based on the fundamental scaling results in MC-MR scenarios [9], [10], more interesting results are further disclosed from the work [2], [12], [13]. Specifically, Wan et al. [2] conduct comprehensive studies on maximum multiflow and max- imum concurrent multiflow in multichannel multiradio multihop wireless networks under the 802.11 interference model. By equipping each node with directional antenna, Dai et al. [12] demonstrate that the capacity of MC-MR

2 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. X, XXXXXXX 2013

(3)

networks can be improved by constant factors. The critical role of transmission power in wireless networks is emphasized by Shila et al. [13], who utilize it to improve capacity performance in MC-MR networks. Although providing useful insights, all these works focus on unicast, with capacity as the only performance metric. The emerging applications of multicast motivates us to take the initiative on its performance investigation in MC-MR networks, for both capacity and delay scalings.

3 S

YSTEM

M

ODEL 3.1 Network Topology

We consider a static dense network O as a unit square. The size normalization and wrap-around conditions are also introduced here, which are common technical assumptions adopted in previous works to avoid tedious technicalities.

Note that these assumptions will not change the main results of this paper. There are totally c channels available in the network. n nodes with wireless communication cap- ability spread in the network, each equipped with m interfaces. We assume that an interface is capable of transmitting or receiving data on any one channel at a given time. The locations of nodes are denoted by Xi

(i 2 ½1; n), which are a series of independent random variables uniformly distributed in O.

3.2 Channel Model

We assume that the total data rate possible by using all channels is W . The total data rate is divided equally among the channels, and, therefore, the data rate supported by any one of the c channels is W =c. This was the channel model used by Gupta and Kumar [8], and we primarily use this model in our analysis. In this model, as the number of channels increases, each channel supports a smaller data rate. This model is applicable to the scenario where the total available bandwidth is fixed, and new channels are created by partitioning existing channels.

3.3 Communication Model

The well-known protocol model is introduced here to roughly represent the behavior of transmission con- strained by interference. The model indicates under a fixed total bandwidth W , a generic node i is allowed to transmit to j if the positions of i and j, denoted by Xi and Xj, satisfy k Xi Xjk< rðnÞ, where r is a common transmission range employed by all the nodes and for every other node k transmitting, k Xj Xkk> ð1 þ ÞrðnÞ, being  a guard factor.

3.4 Traffic Pattern

We consider multicast traffic pattern in present work. Each of the n nodes in the network acts as a source, sending packets to k randomly and uniformly chosen destinations.

Once the source-destinations pairs are selected, the relation- ship remains unchanged.

3.5 Capacity and Delay Definition

Definition 1 (Feasible Multicast Capacity).Given n source nodes, a multicast rate of gðnÞ bits/s is said to be feasible if there is a spatial and temporal scheme for scheduling transmissions, such that by operating the primary network in a multihop fashion and buffering at intermediate nodes

when awaiting transmission opportunities, each source can transmit gðnÞ bits/s on average to its k destinations. That is, there is a T < 1 such that in every time interval

½ði  1Þ  T ; i  T , every source node can send T  gðnÞ bits of data from class k to each of its k destinations.

Definition 2 (Asymptotic Per-Node Multicast Capacity).  of the network is said to be of order ðgðnÞÞ if there exist two positive constants c1and c2such that:

n!1lim IPrf ¼ c1gðnÞ is feasibleg ¼ 1;

n!1lim IPrf ¼ c2gðnÞ is feasibleg < 1:

(

Definition 3 (The Average Aggregate Multicast Capacity).

can be obtained through taking the average on  for all n sources, i.e.,  ¼ n.

Definition 4 (Average Packet Delay).The delay for a packet is defined as the time it takes the packet to reach all its k destinations after it leaves at the source. The average packet delay D of a network is obtained by averaging over all transmitted packets in the network. Besides, we also assume the packet size scales as the per-node capacity.

4 M

AIN

R

ESULTS

The goal of this work is to characterize the joint impact of the ratio of channels to interfaces c=m, the number of destinations k per source as well as node mobility, on the scaling performance in random wireless networks. We divide the results based on static and mobile networks and present the respective findings.

4.1 Scaling Performance in Static MC-MR Networks In static MC-MR networks, multicast capacity yields distinctive results based on different relationship between c=mand k.

1. The case of c=m ¼ Oðlog nÞ:

a. when k ¼ ðpolylogðnÞn Þ, then the per-node multi- cast capacity  is

 m log log n ck log n

 

:

b. when k ¼ OðpolylogðnÞn Þ, then the corresponding multicast capacity  is

 1

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi nk log n p

 

:

2. The case of c=m ¼ ðlog nÞ and c=m ¼ Oðnlog log nlog n Þ:

a. when k ¼ ðcpolylogðnÞnm Þ, then the multicast capa- city  is ðm log log n

ck log n Þ.

b. when

k¼ O nm

cpolylogðnÞ

 

; then  is ð ffiffiffiffiffiffim

nck

p Þ.

(4)

3. The case of c=m ¼ ðnlog log nlog n Þ: in this case, the per- node multicast capacity  ¼ ðm log log n

ck log n Þ. In this case, there is a larger capacity degradation than that in case 2.

A graphical representation of our results is reported in Fig. 1. We adopt the notation poly logðnÞ to hide the detailed poly logarithmic factors for better readability. Refined results are available in Section 5. A notable observation from the figure is that multicast incurs more capacity loss than unicast.

4.2 Scaling Performance in Mobile MC-MR Networks

In mobile MC-MR networks where nodes move according to i.i.d. mobility, multicast capacity can be maximized to

ðnm=ckÞ, where the corresponding delay D satisfyinge . D¼ ðnm log kc Þ, when k ¼ Oðnm log log n=c log nÞ.

. D¼ eðkÞ, when k ¼ ðnm log log n=c log nÞ.

We find the capacity improvement compared to the static networks, since both the connectivity and inter- ference constraints can be effectively eliminated through node mobility. Moreover, delay is also largely reduced compared to single channel scenario, providing us a new perspective of improving delay. Detailed results can be found in subsequent sections.

5 M

ULTICAST

C

APACITY

A

NALYSIS IN

S

TATIC

MC-MR N

ETWORKS

In this section, we will give multicast capacity analysis in static MC-MR network. We first derive the upper bound of multicast capacity and then propose a routing-scheduling scheme to achieve this bound.

5.1 Upper Bound of Multicast Capacity

Recall that each node picks a destination node randomly, and so a node may be the destination of multiple flows. Let FðnÞ be the maximum number of flows for which a node in the network is a destination. We use the following result to bound F ðnÞ.

Lemma 1. In multicast traffic pattern, let F ðnÞ denote the maximum number of flows for which a node in the network is a destination, then we have

FðnÞ ¼  k log log nlog n 

; k¼ O nð Þ;

 nð Þ; k¼  nð Þ;

(

ð1Þ with high probability.

Proof. Provided in Section 1.1 of the supplementary file, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/

TPDS.2012.334. tu

The capacity of multichannel random networks is limited by three constraints, and each of them is used to obtain a bound on the network capacity. The minimum of the three bounds (the bounds depend on ratio between the number of channels c and the number of interfaces m) is an upper bound on the network capacity.

Constraint 1. (Connectivity Constraint): The capacity of random networks is constrained by the need to ensure the network is connected, so that every source-destination pair can successfully communicate. Li [24] has presented a bound on the network capacity of Oðpffiffiffiffiffiffiffiffink log n1 Þ bits/s based on this requirement. This bound is applicable to multi- channel networks as well.

Constraint 2. (Interference Constraint): The capacity of multichannel random networks is also constrained by interference. The bound can be obtained by modifying the techniques presented in [8] to account for multiple channels, interfaces as well as multiple destinations. We present the upper bound in the following lemma.

Lemma 2.In multicast, the capacity with interference constraint is upper bounded by Oð ffiffiffiffiffiffim

cnk

p Þ in the network with c channels and m interfaces per node.

Proof.Provided in Section 1.2 of the online supplemen-

tary file. tu

Constraint 3 (Destination Bottleneck Constraint): The capa- city of a multichannel network is also constrained by the packets that can be received by a destination. Adopting the techniques in [9], we can derive the network capacity is at most OðcFðnÞW mÞ bits/s. Since we have shown in Lemma 1 that FðnÞ ¼ ðklog log nlog n Þ for multicast traffic, we obtain the capacity not more than OðW m log log n

ck log n Þ bits/s.

Now, we can obtain the capacity upper bound by combining the three bounds above together, i.e.,

¼ O min 1

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi nk log n

p ;

ffiffiffiffiffiffiffiffi m cnk r

;m log log n ck log n

 

 

: The upper bound can be further rewritten according to the following theorem.

Theorem 1. The upper bound of multicast capacity in ðm; cÞ network can be presented as follows:

1. When c=m ¼ Oðlog nÞ:

a. when k ¼ ðn  ðmcÞ2ðlog log nÞ2

log n Þ, then the per- node multicast capacity is

4 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. X, XXXXXXX 2013

Fig. 1. Impact of the ratio of channels to interfaces c=m and the number of destinations k, on capacity scaling.

(5)

O m log log n ck log n

 

:

b. when k ¼ Oðn  ðmcÞ2ðlog log nÞ2

log n Þ, then the corre- sponding multicast capacity is Oð ffiffiffiffiffiffiffiffiffiffiffiffi1

nk log n

p Þ.

2. When c=m ¼ ðlog nÞ and c=m¼ O nlog log n

log n

 

:

a. when k ¼ ðn  ðmcÞ  ðlog log nlog n Þ2Þ, then the multi- cast capacity is

O m log log n ck log n

 

:

b. when k ¼ Oðn  ðmcÞ  ðlog log nlog n Þ2Þ, then the multi- cast capacity is

O ffiffiffiffiffiffiffiffi

m nck

r 

:

3. When c=m ¼ ðnlog log nlog n Þ, the per-node multicast capacity is at most Oðm log log n

ck log n Þ.

5.2 Capacity Achieving Scheme

In this section, we will propose a routing and scheduling scheme which suffices to achieve the capacity upper bound in Theorem 1.

5.2.1 Multicast Routing Scheme

In multicast, routing becomes a major issue. Unlike the case of unicast, where a network-partition approach dominates, an optimal multicast routing tree should also be established.

A routing tree is said to be “optimal” in the sense that the capacity achieved under the scheduling scheme based on the tree can reach the upper bound. And we will demonstrate this in Section 5.2.2. Our main idea is to first divide the whole network using the cell-based approach in [9], and then construct a euclidean spanning tree using Prim’s algorithm.

The cell-based approach [9] is to partition the network into cells with side-length rðnÞ satisfying

 min max

ffiffiffiffiffiffiffiffiffiffi log n n r

; ffiffiffiffiffiffiffiffi

c nm

( r )

;

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi log log n k log n

( s )!

: The three values that influence r are based on the three constraints described in the proof of upper bound. Based on such cell size, we proceed to propose an optimal multicast routing tree for each multicast session, shown as follows.

Algorithm 1: Optimal Multicast Routing Tree

STEP 1. Construct a spanning tree using Prim’s algorithm:

1. Initially, nodes in each multicast session form k components.

2. The network is partitioned into k  g squares with side length of each square being 1=d ffiffiffiffiffiffiffiffiffiffiffi

k g

p e.

(g ¼ 1; 2; . . . ; k  1.)

3. Find a square that contains two nodes from two different connected components. Merge the two components by adding an edge between the two nodes.

4. For each g 2 ½1; . . . ; k  1, repeat step (b) and (c) until g ¼ k  1. Return the multicast routing tree, denoted by MRT(k) for each multicast session.

STEP 2. Consider the network divided into cells with side length r. For each edge uv in MRT(k), randomly select a point w that is in the same row as u and the same column as v. Then select a node in each of the cells which uw and wv are crossed by. Connect those users to form a path from u to v.

STEP 3.Combine the paths and remove cycles. Return the obtained multicast routing tree MRT(k) for each multi- cast session.

The length of MRT in the algorithm above is at most c ffiffiffi pk (c is a constant), which can be proved by using the techniques in [24]. Furthermore, we can use these cells (with area rðnÞ2) as scheduling units and employ the TDMA scheduling scheme, and route the packets along tree MRT for each multicast session. To analyze capacity, it is important to study the “flow” of each cell under these schemes.

Lemma 3. Given a cell c, the probability that the flow for a multicast session is routed through c is upper bounded by

 ffiffiffi pk

rðnÞ.

Proof.Provided in Section 1.3 of the online supplementary

file. tu

Lemma 4.Denote NðcÞ as the number of multicast sessions that invoke c for routing, then uniformly over all cells, it follows:

IPrrf8 cell c; NðcÞ  n ffiffiffi pk

rðnÞ:g ! 1: ð2Þ Proof. For a specific squarelet c, we have NðcÞ ¼PK

k¼1Ic, where Icrepresents the indicator function that squarelet cis invoked by transmission of data class k. According to Lemma 3, Ic is i.i.d. Bernoulli random variables with probability p   ffiffiffi

pk

rðnÞ. By Chernoff bounds, we have

IPr NðcÞ > 2IE XK

k¼1

Ic

" #!

< IPr XK

k¼1

Ic> 2IE XK

k¼1

Ic

" #!

<

e 4

npffiffikrðnÞ

< eð ÞnpffiffikrðnÞ=8 :

ð3Þ

Since rðnÞ > ð ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi log n=n

p Þ, we can further get

IPr \K

c¼1

fNðcÞ  0Kn ffiffiffi k p rðnÞg

!

 1 X

c

IPr NðcÞ > 2IE XK

k¼1

Ic

" #!

 1  ne ffiffiffiffiffiffiffiffiffiffi

n log n

p =8! 1:

ð4Þ

Note that the last row of (4) holds as long as n goes to infinity. This completes our proof. tu

(6)

5.2.2 Scheduling Issue

For each node on MRT, we show that every node can be scheduled to transmit once every  time slots, where constant  depending only on R and rðnÞ. For each node v, consider a node u whose transmission will interfere with the transmission of node v. Clearly node u will be completely inside the disk centered at v with radius R þ r.

Thus, the squarelet containing u must be inside the disk centered at v with radius R þ rðnÞ þ ffiffiffi

p2

rðnÞ < R þ 3rðnÞ.

Let  be the maximum number of nodes in MRT whose transmission will interfere with the transmission of a node v. Using the area argument, we have

 ðR þ 3rðnÞÞ2

r2ðnÞ ¼   3 þ R rðnÞ

 2

: ð5Þ

This property ensures that we can schedule the transmis- sions of all nodes in MRT by a TDMA manner such that all nodes will be able to transmit at least once in every  time slots. Notice that here  is a constant.

In previously proposed constructions for proving lower bound on capacity [8], it was immaterial which node in a chosen cell forwarded packets for some flow. However, such an approach may “overload” certain nodes and, therefore, causes capacity degradation, when the number of interfaces per node is smaller than the number of channels.

Consequently, it is important to ensure that the routing load is distributed among the nodes in a cell. Through load balancing [9], each flow is assigned to a node within a cell that has been assigned the least number of flows. Thus, each node will have nearly the same number of flows. Since each cell has ðn  r2ðnÞÞ nodes with high probability ([9, Lemma 4]), and each cell has at most Oðn ffiffiffi

pk

rðnÞÞ flows based on Lemma 4, each node is, therefore, assigned at most Oðpffiffik

rðnÞÞ flows due to load balancing. Also noting that each node in the cell is simultaneously a source, a potential destination as well as a relay for other source-destination pairs, the total flows assigned to every node can be bounded as

O 1þ F ðnÞ þ ffiffiffik p rðnÞ

!

¼ O 1 þ klog log n log n þ

ffiffiffik p rðnÞ

! : Recall the choice of cell size rðnÞ, we know it is at mostffiffiffiffiffiffiffiffiffiffiffiffi

log log n k log n

q

, which means pffiffik

rðnÞ is at least k ffiffiffiffiffiffiffiffiffiffiffiffi

log n log log n

q

. Hence, the total flows assigned to any node are always asymptoti- cally dominated by the term pffiffik

rðnÞ.

The transmission scheduling scheme is responsible for generating a transmission schedule for each node in MC-MR networks that satisfy two constraints: 1) each interface only allows one transmission/reception at the same time; and 2) any two transmissions on any channel should not interfere with each other. We meet the two constraints by proposing a TDMA scheme to schedule transmissions, which is shown as follows.

Algorithm 2: TDMA Scheduling Scheme:

STEP 1. One second is divided into multiple slots and at most one transmission/reception is scheduled at each node during slot satisfying constraint 1. Since the total flows assigned to any nodes is Oðpffiffik

rðnÞÞ and each interface allows only one transmission/reception at the same time, we

divide every second into Oðpffiffik

rðnÞÞ, with each having a length of ðrðnÞpffiffikÞ seconds.

STEP 2. Each time slot is further divided into mini-slots to satisfy constraint 2. Since we have already shown that there is a constant number of interfering cells and each cell has ðnr2ðnÞÞ nodes, the total number of mini-slots on all the c=m channels is, therefore, Oðnr2ðnÞÞ. Two nodes will not interfere with each other if they are scheduled to transmit either on the same channel at the same time, or on different channels, or at different time slots on the same channel. This can be guaranteed by dividing each slot into dnrc=m2ðnÞe mini-slots, each with a length of

 rðnÞ= ffiffiffi pk dnrc=m2ðnÞe 0

@

1 A

seconds.

Considering that each channel can transmit at the rate of W m=cbits/s, our multicast routing and TDMA scheduling schemes ensure that

¼  W mrðnÞ= ffiffiffi pk cdnrc=m2ðnÞe 0

@

1 A

bits can be transported in each mini-slot. Moreover, since dnrc=m2ðnÞe nrc=m2ðnÞþ 1, we can get

¼  W rðnÞ

n ffiffiffi pk

r2ðnÞ þ c ffiffiffi pk

=m

!

bits/s. With further rewriting, we can represent  as

ðminfnpWffiffikrðnÞ;cW rðnÞpffiffik=mgÞ bits/s, when the denominator is either dominated by n ffiffiffi

pk

r2ðnÞ or c ffiffiffi pk

=m.

Substituting for the three values of rðnÞ, we have:

Theorem 2. The multicast capacity of multichannel multiradio network yields distinctive results based on different relation- ship between c, m, and k.

1. The case of c=m ¼ Oðlog nÞ:

a. when k ¼ ðn log log n

log2n Þ, then rðnÞ ¼ ffiffiffiffiffiffiffiffiffiffiffiffilog log n

k log n

q and

the per-node multicast capacity  is

 m log log n ck log n

 

:

b. when k ¼ Oðn log log n

log2n Þ, then rðnÞ ¼ ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi log n=n

p and

the corresponding multicast capacity  is

 1

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi nk log n p

 

:

2. The case of c=m ¼ ðlog nÞ and c=m¼ O nlog log n

log n

 

:

a. when k ¼ ðnm log log n

c log n Þ, then rðnÞ ¼ ffiffiffiffiffiffiffiffiffiffiffiffi

log log n k log n

q and

the multicast capacity  is ðm log log n ck log n Þ.

6 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. X, XXXXXXX 2013

(7)

b. when k ¼ Oðnm log log n

c log n Þ, then rðnÞ ¼ ffiffiffiffiffiffiffiffiffiffiffiffi pc=nm

and

is ð ffiffiffiffiffiffim

nck

p Þ.

3. The case of c=m ¼ ðnlog log nlog n Þ: in this case,

rðnÞ ¼

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi log log n k log n s

and  ¼ ðm log log n

ck log n Þ. In this case, there is a larger capacity degradation than that in case 2.

Corollary 1. The lower bounds in Theorem 2 are tight up to a difference of logarithmic factor in the ranges of k.

Remark 1.With comparison between the upper bounds and lower bounds, it can be seen that there is a difference of logarithmic factor in the range of k when c=m ¼ OðnÞ. As can be seen from the shadow areas in Fig. 2, the turning points of capacity regions exhibit a slight difference when c=m ¼ Oðlog nÞ and ½ðlog nÞ; OðnÞ, respectively.

The difference is due to the simplicity of the cell tessellation scheme that employs an almost uniform transmission range. However, this slight performance drawback can be eliminated by adopting a more sophisticated tessellation scheme. Though it is not our main focus, we remark that it is not difficult to extend such schemes to our framework to make the ranges of k strictly meets those in the upper bounds.

6 M

ULTICAST

C

APACITY IN

M

OBILE

MC-MR N

ETWORKS

6.1 Mobility Model

Time is divided into slots of equal constant duration. We consider a 2D i.i.d. mobility model, according to which the positions of the nodes are totally reshuffled after each slot, independently from slot to slot and among the nodes. With the network divided into n nonoverlapping cells, at the beginning of each slot, a node jumps in zero time to a new cell, and remains in the new cell for the entire duration of a slot. Although the i.i.d. mobility model may appear to be unrealistic, it has been widely adopted in the literature because of its mathematical tractability. Note that the i.i.d.

model also characterizes the maximum degree of mobility.

With the help of mobility, packets can be carried by the nodes until they reach the destinations.

6.2 Maximum Capacity

Theorem 3.Under i.i.d. mobility model, the maximum multicast capacity in multichannel multiradio network is Oðm log log n

ck log n Þ.

Proof.As is already mentioned in static networks, multicast capacity is constrained by destination bottleneck, under which the per-node capacity is at most Oðm log log n

ck log n Þ in MC-MR networks. Unlike static networks, there is no connectivity constraint in mobile networks. Thus, other than destination bottleneck, another constraint that will impact capacity is the interference. And we will show later that the capacity derived under interference con- straint will be least Oðm log log n

ck log n Þ. Therefore, the maximum multicast capacity is upper bounded by Oðm log log n

ck log n Þ in multichannel multiradio mobile networks. tu 6.3 Maximum Capacity Achieving Scheme and

Corresponding Delay

The multichannel construction differs from the mechanisms used in single-channel in that the scheduling is on a per- node basis since flows are distributed among nodes, whereas in the past work it was sufficient to schedule on a per-cell basis. Moreover, to achieve the maximum capacity, it requires that at most one redundancy is used to relay the packets from source to destinations. Also note that there are k destinations, the source has to duplicate a packet at least k times to make the packet reach all k destinations. Recall that in multicast traffic with sources randomly selecting destinations, each node is the destina- tions of at most F ðnÞ sources. We will propose the following scheduling scheme which distributes channels among F ðnÞ flows for each node so that the maximum capacity can be achieved.

Algorithm 3: Multi-Channel Scheduling Scheme without Redundancy

STEP 1. The network is divided into nonoverlapping cells, with each cell of the area r2ðnÞ.

STEP 2.Each cell becomes active once in every 1 þ c3cell time slots.

STEP 3. In an active cell, only one transmission is allowed between two nodes within the same cell in the same channel. And multiple transmissions can be conducted simultaneously if they are scheduled on different channels.

STEP 4.An active packet time-slot is divided into two subslots A and B.

. In subslot A, source-to-relay transmission: If the sender has a new packet, one that has never been transmitted before, send the packet to the receiver and delete it from the buffer. Otherwise, stay idle. In subslot A, totally minfnr2ðnÞ; c=mg source-relay pairs can transmit simultaneously in an active cell.

. In subslot B, relay-to-destination transmission: If the sender has packets received from other nodes that are destined for the receiver and have not been transmitted to the receiver yet, then choose the latest one, transmit. If all the destinations that want to get this packet have received it, it will be dropped from

Fig. 2. Capacity gap and the corresponding k range gap between upper bounds and lower bounds.

(8)

the buffer in the sender. Otherwise, stay idle.

Similarly, totally minfnr2ðnÞ; c=mg relay-destination pairs can transmit simultaneously in an active cell.

We now prove that this scheme achieves the maximum capacity derived in Section 6.2.

Lemma 5.Adopting multichannel scheduling schemes without redundancy, the multicast capacity  is at least

ðminfnrlog log n2ðnÞk log n;m log log n ck log n gÞ.

Proof.One second is divided into mini-slots, each with the length of 1

FðnÞdnr2ðnÞc=m e. Considering that each channel can transmit at the rate of Wm=c bits/s, our multicast routing and TDMA scheduling scheme ensures that

¼  W m

cFðnÞdnrc=m2ðnÞe 0

@

1 A

bits can be transported in each mini-slot. Moreover, since dnrc=m2ðnÞe nrc=m2ðnÞþ 1, we can get

¼  W

FðnÞnr2ðnÞ þ cF ðnÞ=m

 

bits/s. With further rewriting, we can represent  as

 min W

nr2ðnÞF ðnÞ; W cFðnÞ=m

 

 

bits=s;

when the denominator is either dominated by nr2ðnÞF ðnÞ or cF ðnÞ=m. Substituting F ðnÞ ¼ ðlog log nk log nÞ, we can derive the capacity lower bound shown in

the lemma. tu

Note that here rðnÞ should be chosen as

min ffiffiffiffiffiffiffiffi

c nm r

;

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi log log n k log n

( s )

to satisfy both the interference and destination bottleneck constraints. Substituting the two values of rðnÞ, we have the following theorem.

Theorem 4. The multicast capacity of ðm log log n

ck log n Þ can be achieved under multichannel scheduling scheme without redundancy.

Proof.Consider the choice of rðnÞ. When k ¼ Oðnm log log n=

c log nÞ, we have rðnÞ ¼ ffiffiffiffiffic

nm

p . Substituting it into the capacity lower bound derived in Lemma 5, we obtain

¼ ðm log log n

ck log n Þ. When k ¼ ðnm log log n=c log nÞ, we have rðnÞ ¼

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi log log n k log n s

: The capacity in this case yields to be

 min 1

n;m log log n ck log n

 

 

¼  m log log n ck log n

 

:

Therefore, it can be seen that  is always dominated by the termm log log n

ck log n and thus achieves a lower bound of

m log log n

ck log n Þ. tu

Lemma 6.Multichannel scheduling algorithms that do not use redundancy cannot achieve an average delay of D ¼ ðrlog k2ðnÞÞ.

Proof. It has been shown in [26] that using 2-hop relay algorithm without redundancy can achieve a delay of

n log kd Þ for multicast, where d represents the number of nodes per cell. Notice that we partition the network into cells with each having an area of r2ðnÞ. Thus, a delay of

rlog k2ðnÞÞ can be achieved in single channel scenario. In multichannel scenario, the bandwidth of each channel is reduced to W=c bits/s. Since we assume that the packet size is scaled with respect to the throughput obtained for each end-to-end flow, each packet arriving at a node in the cell departs within a constant time. Hence, there may be an increase in the end-to-end latency by a constant factor independent of n and c. We, therefore, obtain the average delay of D ¼ ðrlog k2ðnÞÞ for multicast in multi-

channel network. tu

Note that rðnÞ is set to be minf ffiffiffiffiffic

nm

p ; ffiffiffiffiffiffiffiffiffiffiffiffi

log log n k log n

q g, the delay can be further rewritten as follows:

When k ¼ Oðnm log log n

c log n Þ, rðnÞ ¼ ffiffiffiffiffic

nm

p , we have

D¼  nm log k c

 

: When k ¼ ðnm log log n

c log n Þ, rðnÞ ¼ ffiffiffiffiffiffiffiffiffiffiffiffi

log log n k log n

q , we have

D¼  k log n log k log log n

 

:

Comparing with the results under the scheme of 2-hop relay without redundancy in [26], we find the delay is largely reduced. This is because multiple pairs can be scheduled in our work for simultaneous transmission as long as they are assigned with different channels whereas only one pair is allowed to transmit at one time under a single channel. More detailed comparison and discussion can be referred to Section 7.2.

7 D

ISCUSSION

In this section, we will give some discussion based on the results obtained in previous sections. Particularly, we will take a deeper look into the results and disclose the impact of multicast destination number k, the ratio of channels to interfaces c=m as well as node mobility on scaling performance.

7.1 Joint Impact of kkand c=mc=mon Multicast Capacity We take a look into the static network first. An interesting finding is that the results are quite delicate, depending on both the ratio of channels to interfaces c=m and the destination number k. That is, multicast capacity exhibits three distinctive regions when c=m falls into the range of Oðlog nÞ, ½ðlog nÞ; Oðnlog log nlog n Þ and ðnlog log nlog n Þ, respectively.

And for each range of c=m, the corresponding capacity region is further partitioned due to different ranges of k.

This differs our results from that obtained under unicast traffic where capacity region is solely determined by c=m.

A remarkable phenomenon is that multicast is likely to incur more capacity loss. A more clear picture of the capacity loss region with regard to both k and c=m is

8 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. X, XXXXXXX 2013

(9)

illustrated in Fig. 3. As can be seen from the figure, when c=m¼ Oðlog nÞ, multicast capacity of

 1

ffiffiffiffiffiffiffiffiffiffiffiffiffiffi n log k p

 

is achievable at the same level as single channel scenario, given that k should be restricted to k ¼ Oðn=polylognÞ.

However, as k reaches to a value close to the total number of nodes n in the network, capacity is reduced to eðm=ckÞ.

The reason behind is that a sufficiently large k will enhance the effect of destination bottleneck, overwhelming the connectivity constraint which is turned out to be the dominant constraint under unicast traffic when c=m ¼ Oðlog nÞ. Analogous phenomenon also occurs at c=m falling into the range of ½ðlog nÞ; Oðnlog log nlog n Þ, where destination bottleneck is the strongest and incurs further capacity loss after k exceeds the threshold eðnmc Þ. In contrast, interference constraint plays a more significant role in capacity bottleneck when k is restricted to be less than eðnmc Þ.

7.2 The Impact of c=mc=min Mobile Networks

Now, we turn our attention to the mobile case for discussion about the impact of c=m on multicast scaling.

In particular, we will divide the discussion into two parts, based on capacity and delay performance, respectively.

7.2.1 The Impact on Capacity Scaling

Theorems 3 and 4 both indicate that with i.i.d. mobility introduced into the network, it is possible to unify the different capacity regions shown in static case and improve the capacity to eðm=ckÞ at all ranges of c=m. This is attributed to the fact that mobile network is free of connectivity constraint and mobility can be appropriately utilized to break the bottleneck from interference. An observation from the proof of Theorem 4 is interference constraint is stronger than destination constraint when k is no more than eðnm=cÞ. As a counterpart, the effect of destination constraint becomes more apparent after k exceeds eðnm=cÞ. However, it is delightful that interference constraint can be effectively controlled for not further

degrading capacity even if it is the dominant constraint.

This is because routing tree cannot be established due to the movement of nodes and the corresponding traffic flows assigned to each node per cell is, therefore, solely determined by F ðnÞ.

7.2.2 The Impact on Delay Scaling

A notable phenomenon in mobile network is that there is an interplay between the capacity and delay scaling. The improvement of one metric is achieved at the cost of sacrificing the other one. Note that, in this paper, we focus on 2-hop relay mode without redundancy since our main goal is to achieve the maximum capacity bound. Therefore, even in multichannel scenario, the delay also increases to the maximum value when capacity upper bound is achieved. Nevertheless, we can still have an exciting delay result when comparing with [26], which is based on single- channel framework. Fig. 4 illustrates the delay performance obtained in both [26] and the present work. It is proved in [26] that multicast delay is ðn log kÞ under 2-hop algorithm without redundancy. Executing under the same algorithm in multichannel scenario, we achieve a delay of

ðnm log k=cÞ when k is no more than eðnm=cÞ (see the curve in Fig. 4) and a delay of ðk log k log n= log log nÞ when k exceeds eðnm=cÞ (see the straight lines in Fig. 4).

Obviously, delay is reduced by c times in the former case.

And a delay smaller than ðn log kÞ is still achievable in the latter case as long as k is up to n except for a logarithmic factor, as is shown by the straight lines in the figure. It surprisingly suggests that delay can be greatly reduced in multichannel case even without redundancy relays introduced! The reason behind is that the existence of multichannel allows multiple pairs communicating simul- taneously without causing interference to each other, which effectively contracts the time consumption on transmission from a source to all its destinations.

Rather than simply stick to 2-hop relay algorithm without redundancy between the two works, we take a further look into our results and that under 2-hop relay algorithm with redundancy in [26]. It turns outs that our results still outperform the delay scaling of [26] in such situations. As is demonstrated in [26], no delay smaller than

ðpffiffiffiffiffiffiffiffiffiffiffiffiffiffin log k

Þ is achievable even with more than ðpffiffiffiffiffiffiffiffiffiffiffiffiffiffin log k Þ

Fig. 4. Multicast delay scaling with regard to c=m and k. The comparison between our results and that in [26] is also present in the figure.

Fig. 3. Capacity loss region incurred by both the ratio of channels to interfaces and number of destinations k.

(10)

redundancies introduced in the 2-hop relay scheme.

However, in our work, a delay smaller than ð ffiffiffiffiffiffiffiffiffiffiffiffiffiffi n log k

p Þ is

achievable when k is no more than eðnm=cÞ, as long as c=m¼ ðpffiffiffiffiffiffiffiffiffiffiffiffiffiffin log k

Þ. And it still works when k is in the range of ½ eðnm=cÞ; eð ffiffiffi

pn

Þ, also provided that c=m ¼ ð ffiffiffiffiffiffiffiffiffiffiffiffiffiffi n log k p Þ.1 All those gains are summarized into delay outperform region shown in Fig. 4. This effectively fills in the blank in single-channel where the relay hop count is strictly constrained at 2. We, therefore, obtain a useful insight that delay improvement is possible through frequency reuse other than seeking for complicated techniques or conven- tionally relying on relays.

7.3 Future Directions

Although being the first attempt to study multicast scaling in MC-MR networks, we claim that there are still several directions in which this work could be extended in the future. One natural direction is to explore the heterogeneity in MC-MR networks, where nodes may have nonuniform distribution. It is expectable that heterogeneous distribution is likely to bring out the gain in scaling laws. Another case we anticipate to investigate is that nodes move according to some more realistic mobility models, such as random walk, random way point and Brownian motion, and so on. We believe that multicast scaling will exhibit different perfor- mance in such situations. The extension to social networks is also of interest, where some prominent features such as small-world and human interactions are considered. This is also a potential way to improve multicast performance in MC-MR networks.

8 C

ONCLUSION

We analyze multicast scaling performance in MC-MR networks in this paper. A fixed bandwidth W is equally split into c channels with 0 < m  c interfaces equipped on each node for channel switching. Totally n nodes are distributed throughout the network, each acting as a source with k randomly and uniformly selected destinations. We investigate capacity and delay in both the static and mobile networks and obtain three remarkable findings from our results. First, we find capacity loss exists even if the ratio c=m¼ Oðlog nÞ when k exceeds a threshold. Second, we demonstrate mobility helps to improve multicast capacity in MC-MR networks. Third, it turns out that delay can be largely reduced through frequency reuse without introdu- cing redundancies and even outperforms the results in [26]

in certain cases. To our best knowledge, we are the first to study multicast scaling law in MC-MR networks from a general perspective.

A

CKNOWLEDGMENTS

This paper was supported by National Fundamental Research Grant (no. 2011CB302701); US National Science Foundation China (no. 60832005,61271219); China Ministry of Education New Century Excellent Talent (no. NCET-10- 0580); China Ministry of Education Fok Ying Tung Fund (no. 122002); Qualcomm Research Grant; and Shanghai Basic Research Key Project (no. 11JC1405100).

R

EFERENCES

[1] L. Tang, Y. Sun, O. Gurewitz, and D.B. Johnson, “EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks,” Proc. ACM MobiHoc, May 2011.

[2] P. Wan, Y. Cheng, Z. Wang, and F. Yao, “Multiflows in Multi- Channel Multi-Radio Multihop Wireless Networks,” Proc. IEEE INFOCOM, Apr. 2011.

[3] S. Bodas, S. Shakkottai, L. Ying, and R. Srikant, “Scheduling for Small Delay in Multi-Rate Multi-Channel Wireless Networks,”

Proc. IEEE INFOCOM, Apr. 2011.

[4] A. Chhetri, H.A. Nguyen, G. Scalosub, and R. Zheng, “On Quality of Monitoring for Multi-Channel Wireless Infrastructure Net- works,” Proc. ACM MobiHoc, Sept. 2010.

[5] D.H. Shin and S. Bagchi, “Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks,” Proc. ACM MobiHoc, May 2009.

[6] P. Kyasanur and N.H. Vaidya, “Routing and Link-Layer Protocols for Multi-Channel Multi-Interface Ad Hoc Wireless Networks,”

ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 10, no. 1, pp. 31-43, 2006.

[7] J. Shi, T. Salonidis, and E.W. Knightly, “Starvation Mitigation through Multi-Channel Coordination in CSMA Multi-Hop Wire- less Networks,” Proc. ACM MobiHoc, pp. 214-225, 2006.

[8] P. Gupta and P.R. Kumar, “The Capacity of Wireless Networks,”

IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, Mar.

2000.

[9] P. Kyasanur and N.H. Vaidya, “Capacity of Multi-Channel Wireless Networks: Impact of Number of Channels and Inter- faces,” Proc. ACM MobiCom, pp. 43-57, 2005.

[10] V. Bhandari and N.H. Vaidya, “Connectivity and Capacity of Multi-Channel Wireless Networks with Channel Switching Con- straints,” Proc. IEEE INFOCOM, May 2007.

[11] V. Bhandari and N.H. Vaidya, “Capacity of Multi-Channel Wireless Networks with Random ðc; fÞ Assignment,” Proc. ACM MobiHoc, pp. 229-238, Sept. 2007.

[12] H. Dai, K. Ng, R. Wong, and M. Wu, “On the Capacity of Multi- Channel Wireless Networks Using Directional Antennas,” Proc.

IEEE INFOCOM, 2008.

[13] D.M. Shila, Y. Cheng, T. Anjali, and P. Wan, “Extracting More Capacity from Multi-Radio Multi-Channel Wireless Networks by Exploiting Power,” Proc. IEEE 30th Int’l Conf. Distributed Comput- ing Systems (ICDCS), June 2010.

[14] M. Grossglauser and D.N.C. Tse, “Mobility Increases the Capacity of Ad Hoc Wireless Networks,” IEEE/ACM Trans. Networking, vol. 10, no. 4, pp. 477-486, Aug. 2002.

[15] M.J. Neely and E. Modiano, “Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks,” IEEE Trans. Information Theory, vol. 51, no. 6, pp. 1917-1937, June 2005.

[16] X. Lin and N. Shroff, “The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks,” Proc. Third Ann. Mediterra- nean Ad Hoc Networking Workshop, 2004.

[17] P. Li, Y. Fang, and J. Li, “Throughput, Delay, and Mobility in Wireless Ad Hoc Networks,” Proc. IEEE INFOCOM, Mar. 2010.

[18] M. Garetto and E. Leonardi, “Restricted Mobility Improves Delay- Throughput Trade-Offs in Mobile Ad-Hoc Networks,” IEEE Trans. Information Theory, vol. 56, no. 10, pp. 5016-5029, Oct. 2010.

[19] C. Zhang, Y. Fang, and X. Zhu, “Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding,” Proc. IEEE INFO- COM, Apr. 2009.

[20] L. Ying, S. Yang, and R. Srikant, “Optimal Delay-Throughput Tradeoffs in Mobile Ad Hoc Networks,” IEEE Trans. Information Theory, vol. 54, no. 9, pp. 4119-4143, Sept. 2008.

[21] A. O¨ zgu¨r and O. Le´vque, “Throughput-Delay Trade-Off for Hierarchical Cooperation in Ad Hoc Wireless Networks,” Proc.

Int’l Conf. Telecomm., June 2008.

[22] B. Liu, P. Thiran, and D. Towsley, “Capacity of a Wireless Ad Hoc Network with Infrastructure,” Proc. ACM MobiHoc, Sept. 2007.

[23] P. Li, C. Zhang, and Y. Fang, “Capacity and Delay of Hybrid Wireless Broadband Access Networks,” IEEE J. Selected Areas Comm., vol. 27, no. 2, pp. 117-125, Feb. 2009.

[24] X. Li, “Multicast Capacity of Wireless Ad Hoc Networks,” IEEE/

ACM Trans. Networking, vol. 17, no. 3, pp. 950-961, June 2009.

[25] S. Li, Y. Liu, and X. Li, “Capacity of Large Scale Wireless Networks under Gaussian Channel Model,” Proc. ACM MobiCom, Sept. 2007.

10 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. X, XXXXXXX 2013

1. Notice that this range does not exist when c=m ¼ Oð ffiffiffiffiffiffiffiffiffiffiffiffiffi n log k p Þ since

ðnm=cÞ > ee ffiffiffi pn

Þ.

(11)

[26] X. Wang, W. Huang, S. Wang, J. Zhang, and C. Hu, “Delay and Capacity Tradeoff Analysis for MotionCast,” IEEE/ACM Trans.

Networking, vol. 19, no. 5, pp. 1354-1367, Oct. 2011.

[27] J.M. Steele, “Growth Rates of Euclidean Minimal Spanning Trees with Power Weighted Edges,” The Ann. Probability, vol. 16, no. 4, pp. 1767-1787, Oct. 1988.

Luoyi Fu received the BE degree in electronic engineering from Shanghai Jiao Tong Univer- sity, China, in 2009. She is currently working with Prof. Xinbing Wang toward the PhD degree in the Department of Electronic Engineering, Shanghai Jiao Tong University. Her research interests include the area of scaling laws analysis in wireless networks.

Xinbing Wang (SM ’12) received the BS degree (with hons) in automation from Shanghai Jiao Tong University, China, in 1998, the MS degree in computer science and technology from Tsin- ghua University, Beijing, China, in 2001, and the PhD degree with a major in electrical and computer engineering and minor in mathematics from North Carolina State University, Raleigh, in 2006. Currently, he is a professor with the Department of Electronic Engineering, Shanghai Jiao Tong University. His research interests include resource allocation and management in mobile and wireless networks, TCP asymptotics analysis, wireless capacity, cross-layer call admission control, asympto- tics analysis of hybrid systems, and congestion control over wireless ad hoc and sensor networks. He has been a member of the Technical Program Committees of several conferences including ACM MobiCom 2012, ACM MobiHoc 2012, and IEEE INFOCOM 2009-2013.

. For more information on this or any other computing topic, please visit our Digital Library at www.computer.org/publications/dlib.

數據

Fig. 1. Impact of the ratio of channels to interfaces c=m and the number of destinations k, on capacity scaling.
Fig. 2. Capacity gap and the corresponding k range gap between upper bounds and lower bounds.
Fig. 3. Capacity loss region incurred by both the ratio of channels to interfaces and number of destinations k.

參考文獻

相關文件

好了既然 Z[x] 中的 ideal 不一定是 principle ideal 那麼我們就不能學 Proposition 7.2.11 的方法得到 Z[x] 中的 irreducible element 就是 prime element 了..

volume suppressed mass: (TeV) 2 /M P ∼ 10 −4 eV → mm range can be experimentally tested for any number of extra dimensions - Light U(1) gauge bosons: no derivative couplings. =&gt;

For pedagogical purposes, let us start consideration from a simple one-dimensional (1D) system, where electrons are confined to a chain parallel to the x axis. As it is well known

The observed small neutrino masses strongly suggest the presence of super heavy Majorana neutrinos N. Out-of-thermal equilibrium processes may be easily realized around the

incapable to extract any quantities from QCD, nor to tackle the most interesting physics, namely, the spontaneously chiral symmetry breaking and the color confinement.. 

(1) Determine a hypersurface on which matching condition is given.. (2) Determine a

• Formation of massive primordial stars as origin of objects in the early universe. • Supernova explosions might be visible to the most

The difference resulted from the co- existence of two kinds of words in Buddhist scriptures a foreign words in which di- syllabic words are dominant, and most of them are the