Adaptive network coding and scheduling for maximizing throughput in wireless networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
QoS-driven network coded wireless multicast
IEEE Transactions on Wireless Communications
On delay constrained multicast capacity of large-scale mobile ad-hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Throughput and delay analysis on uncoded and coded wireless broadcast with hard deadline constraints
INFOCOM'10 Proceedings of the 29th conference on Information communications
Scheduling heterogeneous real-time traffic over fading wireless channels
INFOCOM'10 Proceedings of the 29th conference on Information communications
Queueing Systems: Theory and Applications
Hi-index | 0.00 |
There is increasing demand for using wireless networks for applications that generate packets with strict per-packet delay constraints. In addition to delay constraints, such applications also have various traffic patterns and require guarantees on throughputs of packets that are delivered within their delay constraints. Furthermore, a mechanism for serving delay-constrained traffic needs to specifically consider the unreliable nature of wireless links, which may differ from link to link. Also, as it is usually infeasible to gather feedback information from all clients after each transmission, broadcasting delay-constrained traffic requires addressing the challenge of the lack of feedback information. We study a model that jointly considers the application requirements on traffic patterns, delay constraints, and throughput requirements, as well as wireless limitations, including the unreliable wireless links and the lack of feedback information. Based on this model, we develop a general framework for designing feasibility-optimal broadcasting policies that applies to systems with various network coding mechanisms. We demonstrate the usage of this framework by designing policies for three different kinds of systems: one that does not use network coding, one that employs XOR coding, and the last that allows the usage of linear coding.