Wireless Multicast: Theory and Approaches

Loading...
Thumbnail Image
Penn collection
Departmental Papers (ESE)
Degree type
Discipline
Subject
Multicast
optimization
scheduling
stability
stochastic control
throughput
wireless
Funder
Grant number
License
Copyright date
Distributor
Related resources
Author
Chaporkar, Prasanna
Contributor
Abstract

We design transmission strategies for medium access control (MAC) layer multicast that maximize the utilization of available bandwidth. Bandwidth efficiency of wireless multicast can be improved substantially by exploiting the feature that a single transmission can be intercepted by several receivers at the MAC layer. The multicast nature of transmissions, however, changes the fundamental relations between the quality of service (QoS) parameters, throughput, stability, and loss, e.g., a strategy that maximizes the throughput does not necessarily maximize the stability region or minimize the packet loss. We explore the tradeoffs among the QoS parameters, and provide optimal transmission strategies that maximize the throughput subject to stability and loss constraints. The numerical performance evaluations demonstrate that the optimal strategies significantly outperform the existing approaches.

Advisor
Date Range for Data Collection (Start Date)
Date Range for Data Collection (End Date)
Digital Object Identifier
Series name and number
Publication date
2005-06-01
Journal title
Volume number
Issue number
Publisher
Publisher DOI
Journal Issue
Comments
Copyright 2005 IEEE. Reprinted from IEEE Transactions on Information Theory, Volume 51, Issue 6, June 2005, pages 1954-1972. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Recommended citation
Collection