Improved power-delay trade-off in wireless ad hoc networks using opportunistic routing

Won Yong Shin, Sae Young Chung, Yong H. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We study the benefits of opportunistic routing in wireless networks by examining how the power and delay scale as the number of source-destination (S-D) pairs increases, where S-D pairs are randomly located over the network. The scaling behavior of conventional multi-hop transmission that does not employ opportunistic routing is also examined. The results indicate that the opportunistic routing can exhibit better power-delay trade-off than the conventional routing while providing up to a logarithmic boost in the scaling law. The gain comes from the fact that the system with opportunistic routing can tolerate more interference due to increased received signal power from utilizing the multi-user diversity gain. Furthermore, we derive an upper bound on the total throughput using the cut-set theorem. It is shown that the achievable rates of the conventional and opportunistic routing schemes become close to the upper bound when the number of S-D pairs is large enough.

Original languageEnglish
Title of host publicationProceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007
Pages841-845
Number of pages5
DOIs
Publication statusPublished - 2007
Event2007 IEEE International Symposium on Information Theory, ISIT 2007 - Nice, France
Duration: 2007 Jun 242007 Jun 29

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8101

Conference

Conference2007 IEEE International Symposium on Information Theory, ISIT 2007
Country/TerritoryFrance
CityNice
Period07/6/2407/6/29

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Information Systems
  • Modelling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Improved power-delay trade-off in wireless ad hoc networks using opportunistic routing'. Together they form a unique fingerprint.

Cite this