A low-complexity and high-throughput multi-user diversity based multicast scheme for MANETs

We propose a new multicast access scheme that is founded on a metric that allows high-throughput multicast in MANETs. The new access metric, called MOST (as Maximum Opportunistic Scheduling scheme Throughput), is computed for each multicast session and utilized to find the optimal number of transmissions and the best set of transmission data rates to use in order to achieve the highest multicast session throughputs. The new multi-user diversity (MUD) [1] based multicast scheme exploits the wireless broadcast advantage feature [2] and the available channel capacities to get the transmission scheme that offers the highest multicast session throughput without need to know the throughput values of all other possible transmission schemes. The multicast scheme is modeled using a transition tree that is the basis of the metric calculation. This tree is exploited to minimize the number of capacity combinations to inspect before getting the best one. Results prove that the proposed access scheme based on MOST metric achieves throughputs visibly higher than the other proposed schemes.

[1]  Asma Ben Hassouna,et al.  An opportunistic IEEE 802.11 medium access control protocol , 2011, 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011).

[2]  Bu-Sung Lee,et al.  Exploiting wireless broadcast advantage as a network-wide cache , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[3]  C.-C. Jay Kuo,et al.  Optimized Opportunistic Multicast Scheduling over Cellular Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[4]  Hend Koubaa,et al.  Multi-rate interference-sensitive and conflict-aware multicast in wireless ad hoc networks , 2013, 2013 International Conference on Computer Medical Applications (ICCMA).

[5]  Cihan Tepedelenlioglu,et al.  Multi-User Diversity with Random Number of Users , 2011, IEEE Transactions on Wireless Communications.

[6]  H. Koubaa,et al.  A model for deploying an opportunistic MAC protocol in NS-2 , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).