Balancing power and rate to achieve bounded average delay in wireless networks

Behzad Mohammadi Dogahe, Xingzhe Fan, Manohar N. Murthi, Kamal Premaratne

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations


Allocating limited resources such as bandwidth and power in a multi-hop wireless network can be formulated as a Network Utility Maximization (NUM) problem. In this approach, both source transmitting and link relaying nodes exchange information allowing for the NUM problem to be solved in an iterative distributed manner. Previous NUM formulations of wireless networks have considered the parameters of data rate and reliability in the utility function which measures an application's performance. However, it is well known that delay is an important factor in the performance of many applications. In this paper, we consider an additional constraint based on the delay requirements of the sources. This augmented NUM formulation allows an application to tradeoff rate, power and queuing delay according to its needs, thereby providing greater flexibility. Power allocation among different transmitters is a subtle issue to deal with in this problem, since the capacity of the wireless links are interference limited. A distributed iterative algorithm solving the NUM is presented along with its convergence. The performance of the algorithm is examined via simulations which confirm the expectations from the theory.

Original languageEnglish (US)
Title of host publicationMilitary Communications Conference, MILCOM 2007
StatePublished - Dec 1 2007
EventMilitary Communications Conference, MILCOM 2007 - Orlando, FL, United States
Duration: Oct 29 2007Oct 31 2007

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM


OtherMilitary Communications Conference, MILCOM 2007
Country/TerritoryUnited States
CityOrlando, FL

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Balancing power and rate to achieve bounded average delay in wireless networks'. Together they form a unique fingerprint.

Cite this