Cross-layer rate control in wireless networks with lossy links: Leaky-pipe flow, effective network utility maximization and hop-by-hop algorithms

Qinghai Gao, Junshan Zhang, Stephen V. Hanly

Research output: Contribution to journalArticle

30 Scopus citations

Abstract

We take a cross-layer design approach to study rate control in multihop wireless networks. Due to the lossy nature of wireless links, the data rate of a given flow becomes smaller and smaller along its routing path. As a result, the data rate received successfully at the destination node (the effective rate) is typically lower than the transmission rate at the source node (the injection rate). In light of this observation, we treat each flow as a leaky-pipe" flow and introduce the notion of effective utility associated with the effective rate (not the injection rate) of each flow. We then explore rate control through effective network utility maximization (ENUM) in this study. Two network models are studied in this paper: 1) ENUM with link outage constraints with a maximum error rate at each link; 2) ENUM with path outage constraints where there exists an end-to-end outage requirement for each flow. For both models, we explicitly take into account the thinning feature of data flows and devise distributed hop-by-hop rate control algorithms accordingly. Our numerical examples corroborate that higher effective network utility and better fairness can be achieved by the ENUM algorithms than the standard NUM.

Original languageEnglish (US)
Article number5089987
Pages (from-to)3068-3076
Number of pages9
JournalIEEE Transactions on Wireless Communications
Volume8
Issue number6
DOIs
StatePublished - Jun 1 2009

Keywords

  • Cross-layer optimization
  • ENUM
  • Flow control
  • Hop-by-hop algorithms
  • Leaky-pipe model

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Cross-layer rate control in wireless networks with lossy links: Leaky-pipe flow, effective network utility maximization and hop-by-hop algorithms'. Together they form a unique fingerprint.

  • Cite this