• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Wei, Yang Ming, Luo Junzhou, and Wu Wenjia. Modeling and Analysis of Multicast Delay in Network Coding-Based Multi-Radio Wireless Mesh Networks[J]. Journal of Computer Research and Development, 2012, 49(6): 1174-1184.
Citation: Wang Wei, Yang Ming, Luo Junzhou, and Wu Wenjia. Modeling and Analysis of Multicast Delay in Network Coding-Based Multi-Radio Wireless Mesh Networks[J]. Journal of Computer Research and Development, 2012, 49(6): 1174-1184.

Modeling and Analysis of Multicast Delay in Network Coding-Based Multi-Radio Wireless Mesh Networks

More Information
  • Published Date: June 14, 2012
  • Network coding greatly improves the throughput in multi-radio wireless mesh networks (MR-WMNs), however, it also increases the multicast transmission delay due to packets buffering during the coding/decoding procedure. In order to optimize multicast transmission delay, it is crucial to quantitatively analyze key parameters affecting the performance of WMNs. An average multicast transmission delay (AMTD) optimization scheme is proposed based on modeling and analysis of MR-WMN multicast transmission delay using network coding. Firstly, we propose a multi-radio multicast model consisting of M/M/Nr and GI/GI/1 queueing systems in tandem. Secondly, we analyze the features of multicast transmission delay based on the proposed model, and obtain the quantitative relationship between AMTD and network parameters by computing the sum of average waiting time of two queueing systems. Finally, theoretical analysis and simulation results show that the parameters among network load intensity, channel quality, multicast group size, network coding size and RF allocation ratio, can be used to optimize the average multicast transmission delay. The conclusion is given that the best ratio with lowest delay may not still hold within different network coding sizes for a given network and the average multicast transmission delay optimization can be achieved by adjusting RF receive/send ratio suggested by the AMTD formula.
  • Related Articles

    [1]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [2]Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
    [3]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [4]Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.
    [5]Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585.
    [6]Li Lin and Lu Xianliang. An Algorithm for Detecting Filters Conflicts Based on the Intersection of Bit Vectors[J]. Journal of Computer Research and Development, 2008, 45(2): 237-245.
    [7]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [8]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    [9]Mao Tianlu, Wang Zhaoqi, Xia Shihong. An Algorithm for Collision Detection and Response Between Human Body Model and Cloth in 3D Garment Simulation[J]. Journal of Computer Research and Development, 2006, 43(2): 356-361.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (729) PDF downloads (404) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return