Capacity analysis of best-effort broadcasting services with reliability constraint

Minho Kim, Eun Chan Park, Kyung Joon Park, Chong Ho Choi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In this paper, we consider best-effort broadcast service (BEBS) in wireless cellular networks, which can be used for location-based advertising or real-time multimedia broadcasting. Contrary to the conventional broadcasting service that aims to assure reliable data delivery to all users, we establish the objective of BEBS to maximize the effective capacity of wireless resource at the cost of reliability. In this context, we introduce the notion of target reliability and formulate the problem of maximizing the capacity of BEBS under a constraint of reliability. We derive the analysis model to investigate the effect of target reliability on the achievable capacity and validate the analysis model by comparing the analysis results with the simulation results. Both analysis and simulation results confirm that the BEBS significantly improves the effective capacity by relaxing the reliability constraint, compared to the conventional reliable broadcasting.

Original languageEnglish
Title of host publication2012 International Conference on Computing, Networking and Communications, ICNC'12
Pages1133-1137
Number of pages5
DOIs
StatePublished - 2012
Event2012 International Conference on Computing, Networking and Communications, ICNC'12 - Maui, HI, United States
Duration: 30 Jan 20122 Feb 2012

Publication series

Name2012 International Conference on Computing, Networking and Communications, ICNC'12

Conference

Conference2012 International Conference on Computing, Networking and Communications, ICNC'12
Country/TerritoryUnited States
CityMaui, HI
Period30/01/122/02/12

Keywords

  • Broadcasting
  • capacity
  • cellular networks
  • reliability

Fingerprint

Dive into the research topics of 'Capacity analysis of best-effort broadcasting services with reliability constraint'. Together they form a unique fingerprint.

Cite this