By Topic

Cross-layer Resource Allocation Strategies for Quality-of-Service Driven Opportunistic Routing Over Wireless Relay Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Lin Xie ; Networking and Information Systems Laboratory, Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843, USA. Email: lxie@ece.tamu.edu ; Xi Zhang

We develop a cross-layer optimization framework incorporating opportunistic routing and quality-of service (QoS) driven power allocation. By applying opportunistic routing, we optimally select one relay for each source-destination pair to assist their transmissions. By integrating information theory with the concept of effective capacity, our strategies aim at maximizing the relay network throughput subject to a given delay QoS constraint. We first propose two resource allocation strategies for the QoS driven opportunistic routing, under two different instantaneous power constraints. In the first strategy, we set the instantaneous constraint on the total transmission power of the wireless relay networks; while in the second one, we set the power constraint on each source-destination pair. In addition, we introduce another resource allocation strategy with the average power constraint of each source-destination pair. The simulation results show that the first two strategies have nearly the same effective capacity performance, and that the third strategy outperforms the first two strategies only when the QoS requirement is stringent.

Published in:

2007 41st Annual Conference on Information Sciences and Systems

Date of Conference:

14-16 March 2007