Multi-channel Wireless Networks with
Infrastructure Support: Capacity and Delay
Hong-Ning Dai∗ Raymond Chi-Wing Wong† and Qinglin Zhao∗
∗ Macau
University of Science and Technology, Macau
hndai@ieee.org zqlict@hotmail.com
† Hong Kong University of Science and Technology, Hong Kong
raywong@cse.ust.hk
Abstract—In this paper, we propose a novel multi-channel
wireless network with infrastructure support, called an MCIS network. To the best of our knowledge, we are the first to
study the capacity and the delay of such an MC-IS network. In
particular, we derive the upper bounds and the lower bounds on
the network capacity of such MC-IS networks contributed by ad
hoc communications, where the orders of the upper bounds are
the same as the orders of the lower bounds, implying that the
bounds are tight. We also found that the capacity of MC-IS networks contributed by ad hoc communications is mainly limited by
connectivity requirement, interference requirement, destinationbottleneck requirement and interface-bottleneck requirement. In
addition, we also derive the average delay of MC-IS networks
contributed by ad hoc communications, which is bounded by the
maximum number of hops.
I. I NTRODUCTION
In this paper, we propose a novel multi-channel network
with infrastructure support, which is called an MC-IS network.
An MC-IS network consists of common nodes (or nodes), each
with a single network interface card (NIC), and infrastructure
nodes (or base stations), each with multiple NICs, where
infrastructure nodes are connected via a wired network that has
much higher bandwidth than a wireless network of common
nodes. Both common nodes and infrastructure nodes can
operate on different channels. Besides, an MC-IS network has
the following additional characteristics.
• Each node with a single NIC can communicate with either
another node or a base station. But, a node supports only
one transmission or one reception at a time. Besides, it
cannot simultaneously transmit and receive (i.e., it is in
a half-duplex mode).
• Each base station with multiple NICs can communicate
with more than one node. In addition, a base station
can work in a full-duplex mode, i.e., transmissions and
receptions can occur in parallel.
Take Fig. 1 as an example of MC-IS networks. In this
network, n nodes are randomly, uniformly and independently
distributed on a unit square plane A. Each node is mounted
with a single interface that can switch to one of C available
channels and it can be a data source or a destination. All
the nodes have the same transmission range. Besides, there
are b base stations, where b is assume to be a square of an
integer b0 (i.e., b = b20 ). Each base station is equipped with m
interfaces, each of which is associated with a single interface
Fig. 1.
Network topology of an MC-IS network
that can operate on one of C channels. The plane A is evenly
partitioned into b equal-sized squares, which are called BScells. We assume that a base station is placed at the center of
each BS-cell. Unlike a node, a base station is neither a data
source nor a destination and it only helps forwarding data for
nodes. All the base stations are connected through a wired
network without capacity constraint and delay constraint.
There are two kinds of communications in an MC-IS
network: (i) Ad hoc communications between two nodes,
which often proceed in a multi-hop manner; (ii) Infrastructure
communications between a node and a base station, which
span a single hop, as shown in Fig. 1. An infrastructure communication consists of an uplink infrastructure communication
from a node to a base station, and a downlink infrastructure
communication from a base station to a node.
In this paper, we consider the H-max-hop routing strategy,
in which, if the destination is located within H (H ≥ 1)
hops from the source node, data packets are transmitted in ad
hoc communications. Otherwise, data packets are forwarded
in infrastructure communications. The base station then relays
the packets through the wired network. After the packets arrive
at the base station that is closest to the destination node,
the base station then forwards the packets to the destination
node (i.e., the downlink infrastructure communication). It is
obvious that when there is an uplink communication, there
is always a downlink communication. We then divide the
total bandwidth of W bits/sec into three parts: (1) WA for
ad hoc communications, (2) WI,U for uplink infrastructure
communications and (3) WI,D for downlink infrastructure
communications. Since WI,U is equal to WI,D , it is obvious
that W = WA + WI,U + WI,D = WA + 2WI,U . To simplify
our analysis, we use WI to denote either WI,U or WI,D .
TABLE I
T HE MAIN RESULTS
=
=
=
=
=
Conditions
Per-node Throughput λ
Connectivity
Θ( HCWA
)
log n
A
Condition
=
=
=
=
Interference
=
Θ(
Condition
Fig. 2.
Interface-bottleneck
All possible sub-cases considered
Condition
Corresponding to the partition of the bandwidth, we also split
the C channels into two disjoint groups CA and CI , in which
CA channels are dedicated for ad hoc communications and
CI channels are dedicated for infrastructure communications.
Thus, C = CA + CI . Besides, each base station is mounted
with m NICs, which serve for both the uplink traffic and the
downlink traffic. It is obvious that the number of NICs serving
for the uplink traffic is equal to the number of NICs serving
for the downlink traffic. So, m must be an even number.
To the best of our knowledge, we are the first to propose
such an MC-IS network, which has not been studied in the
literature.
A. Contributions and Main Results
The primary research contributions of our paper are summarized as follows.
(1) We formally identify an MC-IS network that characterizes the features of multi-channel wireless networks with
infrastructure support. The capacity and the average
delay of an MC-IS network have not been studied before.
(2) We derive both the upper bounds and the constructive
lower bounds of the capacity of an MC-IS network
contributed by ad hoc communications. Importantly, the
orders of the lower bounds are the same as the orders
of the upper bounds, meaning that the upper bounds are
tight. We also derive the delay of an MC-IS network
contributed by ad hoc communications.
(3) We found that the capacity of an MC-IS network contributed by ad hoc communications is mainly limited
by four requirements - connectivity requirement, interference requirement, destination-bottleneck requirement
and interface-bottleneck requirement.
Regarding (1), we identify the characteristics of an MCIS network and describe the network topology, the network
communications and the routing strategy in Section II, which
also presents the models and assumptions used in this paper.
We then derive the upper bounds on the network capacity
contributed by ad hoc communications in Section III and the
constructive lower bounds in Section IV, both of which bring
us to (2) above.
With regard to (3), we summarize our main results in Table
I, which are stated in Theorem 1 and Theorem 2. Specifically,
WA
1
1
)
2 H log 2 n
CA
Condition
Destination-bottleneck
Delay D
Θ(H)
1
Θ(
n 2 log log(H 2 log n)WA
)
1
CA H log 2 n·log(H 2 log n)
n
·
Θ(H 2 log
n
WA
CA
)
we found that the capacity of an MC-IS network is mainly
limited by four requirements: (i) Connectivity requirement the need to ensure that the network is connected so that each
source node can successfully communicate with its destination
node; (ii) Interference requirement - two receivers simultaneously receiving packets from two different transmitters must
be separated with a minimum distance to avoid the interference; (iii) Destination-bottleneck requirement - the maximum
amount of data that can be simultaneously received by a
destination node; (iv) Interface-bottleneck requirement - the
maximum amount of data that an interface can simultaneously
transmit or receive. We also found that each of the four
requirements dominates the other three requirements in terms
of the throughput of the network under different conditions on
CA and H. Specifically, CA can be partitioned into 3 cases: (1)
the case when CA = O(F1 ), (2) the case when CA = Ω(F1 )
and CA = O(F2 ), and (3) the case when CA = Ω(F2 ), where
2
log n) 2
F1 = log n and F2 = n( logloglog(H(H
2 log n) ) .
Under each of the above cases, H can be partitioned into
two sub-cases. Under the first case, H is partitioned into 2
sub-cases, namely Sub-case 1 (when H = o(G1 )) and Sub2
1
case 2 (when H = Ω(G1 )), where G1 = n 3 / log 3 n. Under
the second case, H is partitioned into 2 sub-cases, namely
Sub-case 3 (when H = o(G2 )) and Sub-case 4 (when H =
1
1
1
Ω(G2 )), where G2 = n 3 CA6 / log 2 n. Under the third case,
H is partitioned into 2 sub-cases, namely Sub-case 5 (when
H = o(G3 )) and Sub-case 6 (when H = Ω(G3 )), where G3 =
1
1
n 2 / log 2 n. Fig. 2 shows all possible sub-cases. Specifically,
each requirement dominates the other at least one sub-case
under different conditions as follows.
•
•
•
•
Connectivity Condition: corresponding to Sub-case 2 in
which Connectivity requirement dominates.
Interference Condition: corresponding to Sub-case 4 in
which Interference requirement dominates.
Destination-bottleneck Condition: corresponding to Subcase 6 in which Destination-bottleneck requirement dominates.
Interface-bottleneck Condition: corresponding to Subcase 1, Sub-case 3, or Sub-case 5, in which Interfacebottleneck requirement dominates.
II. F ORMULATION
AND
M ODELS
A. Interference model
We consider the interference model [1]–[6]. When node X1
transmits to node X2 over a particular channel, the transmission is successfully completed by node X2 if no node within
the transmission range of X2 transmits over the same channel.
Therefore, for any other node X3 simultaneously transmitting
over the same channel, and any guard zone ∆ > 0, the
following condition holds.
dist(X3 , X2 ) ≥ (1 + ∆)dist(X1 , X2 )
where dist(X1 , X2 ) denotes the distance between two nodes
X1 and X2 . The interference model applies for both ad hoc
communications and infrastructure communications. Since ad
hoc communications and infrastructure communications are
separated by different channels (i.e., CA and CI ), the interference only occurs either between two ad hoc communications
or between two infrastructure communications.
B. Definitions of Throughput Capacity and Delay
Definition 1: Feasible per-node throughput. For an MC-IS
network, a throughput of λ (in bits/sec) is feasible if by ad
hoc communications or infrastructure communications, there
exists a spatial and temporal scheme, within which each node
can send or receive λ bits/sec on average.
Definition 2: Per-node throughput capacity with the
throughput of λ is of order Θ(g(n)) bits/sec if there are
deterministic constants h > 0 and h′ < +∞ such that
limn→∞
limn→∞ inf
P (λ = hg(n) is feasible) = 1 and
P (λ = h′ g(n) is feasible) < 1
Besides, we use T and TA to denote the feasible aggregate
throughput and the feasible aggregate throughput contributed
by ad hoc communications, respectively.
The delay of a packet D is defined as the time that it takes
for the packet to reach its destination after it leaves the source
[7]. Averaging the delay of all the packets transmitted in the
whole network, we obtain the average delay of a network.
III. U PPER B OUNDS ON N ETWORK C APACITY
C ONTRIBUTED BY A D H OC C OMMUNICATIONS
We first derive the upper bounds on the per-node throughput
capacity under Connectivity Condition.
Proposition 1: When Connectivity requirement dominates,
the per-node throughput capacity contributed by ad hoc comA
).
munications is λa = O( H 3 CnW
2
A log n
Proof. We first calculate the expectation of the number of hops
under the H-max-hop routing scheme, which is denoted by h
h = E(h) =
1 · P (h = 1) + 2 · P (h = 2) + . . .
+H · P (h = H)
3πr2 (n)
πr2 (n)
+2·
+ ...
= 1·
2
2
πH r (n)
πH 2 r2 (n)
(H 2 − (H − 1)2 )πr2 (n)
+H ·
πH 2 r2 (n)
4H 3 + 3H 2 − H
=
(1)
6H 2
where P (h = i) (i = 1, 2, . . . , H) is the probability that a
packet traverses h = i hops.
From Eq. (1), we have h ∼ H.
We then calculate the probability that a node uses the ad hoc
mode to transmit, denoted by P (AH), which is the probability
that the destination node is located within H hops away from
the source node. Thus, we have
P (AH) = πH 2 r2 (n)
(2)
Since each source generates λa bits per second and there are
totally n sources, the total number of bits per second served by
the whole network on a particular channel is required to be at
A
least n·P (AH)·h·λa , which is bounded by Nmax · W
CA , where
Nmax is the maximum number of simultaneous transmissions
on any particular channel, which is upper bounded by Nmax ≤
k1
∆2 (r(n))2 (k1 > 0 is a constant, independent of n) [1]. Then,
A
we have n · P (AH) · h · λa ≤ Nmax · W
CA .
Combining the above results yields:
λa ≤
k1
2
∆ r2 (n)
·
WA
3
nπH r2 (n)CA
≤
k2 WA
3
nH r2 (n)CA
where k2 is a constant.
Besides, to guarantee that the network is p
connected with
high probability (w.h.p.)1, we require r(n) > log n/πn [1].
3 nWA
Thus, we have λa ≤ H 3klog
2 nC , where k3 is a constant.
A
We then derive the upper bounds on the per-node throughput
capacity under Interference Condition.
Proposition 2: When Interference requirement dominates,
the per-node throughput capacity contributed by ad hoc communications is λa = O( 1 nWA 3 ).
CA2 H 3 log 2 n
Proof. When Interference Condition is satisfied, the per-node
throughput is limited by the interference requirement [1].
Thus, we can use the theorem derived under arbitrary networks
[1]. Similarly, we assume that all nodes are synchronized. Let
the average distance between a source and a destination be l,
which is roughly bounded by h · r(n).
In the network with n nodes and under the H-max-hop
routing scheme, there are at most n · P (AH), where P (AH)
is the probability that a node transmits in ad hoc mode and can
be calculated by Eq. (2). Within any time period, we consider
a bit b, 1 ≤ b ≤ λnP (AH) We assume that bit b traverses h(b)
1 We say that an event e happens with a high probability if P (e) → 1 when
n → ∞.
hops on the path from the source to the destination, where the
h-th hop traverses a distance of r(b, h). It is obvious that the
distance traversed by a bit from the source to the destination is
no less than the length of the line jointing the source and the
destination. Thus, after summarizing the traversing distance of
all bits, we have
nλa P (AH) h(b)
λa · nl · P (AH) ≤
X
X
b=1
r(b, h)
h=1
Let Th be the total number of hops traversed by all bits in a
Pnλ P (AH)
second and we have Th = b=1a
h(b). Since each node
A
has one interface which can transmit at most W
CA , the total
number of bits that can be transmitted by all nodes over all
An
interfaces are at most W
2CA , i.e.,
Th ≤
WA n
2CA
(3)
On the other hand, under the interference model, we have
the following in-equation from [1]
∆
(dist(X3 − X4 ) + dist(X1 − X2 ))
2
where X1 and X3 denote the transmitters and X2 and X4
denote the receivers. This in-equation implies that each hop
consumes a disk of radiums ∆
2 times the length of the hop.
Therefore, we have
dist(X1 − X2 ) ≥
nλa P (AH) h(b)
X
b=1
X π∆2
(r(b, h))2 ≤ WA
4
nλa P (AH) h(b)
b=1
X 1
4WA
(r(b, h))2 ≤
Th
π∆2 Th
(4)
h=1
Since the left hand side of this in-equation is convex, we
have
nλa P (AH) h(b)
X X 1
X 1
2
r(b, h)) ≤
(r(b, h))2 (5)
Th
Th
nλa P (AH) h(b)
(
X
b=1
b=1
h=1
h=1
Joining (4)(5), we have
nλa P (AH) h(b)
X
b=1
X
r(b, h) ≤
h=1
r
4WA Th
π∆2
From (3), we have
nλa P (AH) h(b)
X
b=1
X
h=1
r(b, h) ≤ WA
r
λa ≤
q
log n
πn ,
we have
k4 nWA
1
2
3
CA H 3 log 2 n
Before deriving the upper bounds on the throughput capacity
under the destination-bottleneck condition, we need to bound
the number of flows towards a node under the H-max-hop
routing scheme. Specifically, we have the following result.
Lemma 1: The maximum number of flows towards a
node under the H-max-hop routing scheme is DH (n) =
2
log n)
Θ( loglog(H
log(H 2 log n) ) with high probability (w.h.p.).
Proof. As shown in [6], the total number of source nodes
transmitting in ad hoc mode under the H-max-hop routing
scheme is Θ(H 2 log n) w.h.p.. Besides, it is proved in [8] that
the maximum number of flows towards any given node in
a random ad hoc network with n nodes is upper bounded
by Θ( logloglogn n ) w.h.p.. Combining the two results leads to the
above result.
We then obtain the upper bounds on the per-node throughput
capacity under Destination-bottleneck Condition.
Proposition 3: When
Destination-bottleneck
requirement dominates, the per-node throughput capacity
contributed by ad hoc communications is λa
=
3
3
O(n 2 log log(H 2 log n)WA /(CA H 3 log 2 n · log(H 2 log n))).
Proof. Each node has one interface that can support at most
WA
CA . Since each node has at most DH (n) flows under the
H-max-hop routing scheme, the data rate of the minimum
A
rate flow is at most CAW
DH (n) , where DH (n) is bounded
2
h=1
This in-equation can be rewritten as
X
Since r(n) >
2n
π∆2 CA
Pnλ P (AH) Ph(b)
Besides, since λa ·nl·P (AH) ≤ b=1a
h=1 r(b, h),
we have
q
q
q
2n
2
WA π∆2n
W
W
A
A
2C
π∆2 CA
π∆2 nCA
A
λa ≤
=
≤
πH 3 (r(n))3
nl · P (AH)
nhr(n)πH 2 (r(n))2
log n)
by Θ( loglog(H
log(H 2 log n) ) by Lemma 1. After calculating all
the data rates at each node times with the traversing distance, we have n · P (AH) · λA · h · r(n) ≤ CAWDAHn(n) · 1,
where P (AH) and h are defined in the proof of PropoWA
sition 1. We then have λA ≤ C D (n)P
≤
(AH)hr(n)
A
H
WA
CA πH 3 r 3 (n)·log(H 2 log n)/ log log(H 2 log n)
2 2
since h ∼ H and
P (AH) = πH r (n)
as
shown
in
the
proof of Proposition
p
3
1. Since r(n) = Θ( log n/n) [1], we have λA ≤ WA n 2 ·
3
log log(H 2 log n)/(CA H 3 log 2 n · log(H 2 log n))
Finally, we prove the upper bounds on the per-node throughput capacity under Interface-bottleneck Condition.
Proposition 4: When Interface-bottleneck requirement
dominates, the per-node throughput capacity contributed by
A
ad hoc communications is λa = O( W
CA ).
Proof. In an MC-IS network, each node is equipped with only
A
one NIC supporting at most W
CA data rate. Thus, λa is also
WA
upper bounded by CA for any network settings.
IV. C ONSTRUCTIVE L OWER B OUNDS ON N ETWORK
C APACITY C ONTRIBUTED BY A D H OC C OMMUNICATIONS
We first divide the plane into a number of equal-sized cells.
The size of each cell is properly chosen so that each cell
has Θ(na(n)) nodes, where a(n) is the area of a cell. We
then design a routing scheme to assign the number of flows at
each node evenly. Finally, we design a Time Division Multiple
Access (TDMA) scheme to schedule the traffic at each node.
−
Fig. 4.
Fig. 3.
Plane divided into a number of cells and each with area a(n).
A. Cell Construction
We divide the plane into 1/a(n) equal-sized cells
and each cell is a square with area of a(n), as
shown in Fig. 3. The cell size of a(n) must be
carefully chosen to fulfill the three requirements, i.e.,
Connectivity requirement, Interference requirement and
Destination-bottleneck requirement. We set a(n)
=
√
min(max( 100
3
CA log n
, log 2
n
1
n/CA2 n), log3
3
2
n·log(H 2 log n)
n 2 ·log log(H 2
log n)
)
similar to [4]. Note that Interface-bottleneck requirement is
independent of the size of a cell.
The maximum number of nodes in a cell is bounded by the
following lemma.
n
, then each cell has
Lemma 2: [4] If a(n) > 50 log
n
Θ(n(a(n)) nodes w.h.p..
We next check whether all the above values of a(n) are
properly chosen such that each cell has Θ(n(a(n)) nodes
w.h.p. when n is large
enough (i.e., Lemma 2 is satisfied). It
√
1
3
n
is obvious that 100 CnA log n > 50 log
and log 2 n/(CA2 n) >
n
50 log n
(as we only consider CA in Connectivity Condition and
n
3
Interference Condition). Besides,
n
greater than 50 log
with
n
3
3
n
and log 2 n/n 2 > 50 log
n
large n
log 2 n·log(H 2 log n)
3
n2
is also
·log log(H 2 log n)
2
log n)
since loglog(H
log(H 2 log n)
> 1
when n is large enough.
It is also proved in [7], [9] that the number of interfering
cells around a cell is bounded by a constant k5 , which is
independent of n.
B. Routing Scheme
To assign the flows at each node evenly, we design a
routing scheme consists of two steps: (1) Assigning sources
and destinations and (2) Assigning the remaining flows in a
balanced way.
In Step (1), each node is the originator of a flow and each
node is the destination of at most DH (n) flows, where DH (n)
is defined in Lemma 1. Thus, after Step (1), there are at most
1 + DH (n) flows.
We denote the straight line connecting a source S to its
destination D as an S-D lines. In Step (2), we need to calculate
the number of S-D lines (flows) passing through a cell so that
we can assign them to each node evenly. Specifically, we have
the following result.
Lemma 3: The number of S-D lines passing through a cell
is bounded by O(nH 3 (a(n))2 ).
Proof. We present a proof of the bound in [9].
TDMA transmission schedule
As shown in Lemma 2, there are Θ(n · a(n)) nodes in
each cell. Therefore, Step (2) will assign to any node at most
3
(a(n))2
) = O(H 3 a(n)) flows. Summarizing Step (1)
O( nHn·a(n)
and Step (2), there are at most f (n) = O(1 + H 3 a(n) +
DH (n)) flows at each node. On the other hand, H 3 a(n)
dominates f (n) since H > 1 and a(n) is asymptotically
larger than DH (n) when n is large enough. Thus, we have
f (n) = O(H 3 a(n)).
C. Scheduling Transmissions
We next design a scheduling scheme to transmit the traffic
flows assigned in a routing scheme. Any transmissions in this
network must satisfy the two additional constraints simultaneously: 1) each interface only allows one transmission/reception
at the same time, and 2) any two transmissions on any channel
should not interfere with each other.
We propose a TDMA scheme to schedule transmissions that
satisfy the above two constraints. Fig. 4 depicts a schedule of
transmissions on the network. In this scheme, one second is
divided into a number of edge-color slots and at most one
transmission/reception is scheduled at every node during each
edge-color slot. So, the first constraint is satisfied. Each edgecolor slot can be further split into smaller mini-slots. In each
mini-slot, each transmission satisfies the above two constraints.
Then, we describe the two time slots as follows.
(i) Edge-color slot: First, we construct a routing graph in
which vertices are the nodes in the network and an edge
denotes transmission/reception of a node. In this construction,
one hop along a flow is associated with one edge in the routing
graph. In the routing graph, each vertex is assigned with
f (n) = O(H 3 a(n)) edges, which can be edge-colored with at
most O(H 3 a(n)) colors [4], [10]. We then divide one second
into O(H 3 a(n)) edge-color slots, each of which has a length
1
of Ω( H 3 a(n)
) seconds and is stained with a unique edge-color.
Since all edges connecting to a vertex use different colors, each
node has at most one transmission/reception scheduled in any
edge-color time slot.
(ii) Mini-slot: We further divide each edge-color slot into
mini-slots. Then, we build a schedule that assigns a transmission to a node in a mini-slot within an edge-color slot over
a channel. We construct an interference graph in which each
vertex is a node in the network and each edge denotes the
interference between two nodes. We then show as follows that
the interference graph can be vertex-colored with k7 (na(n))
colors, where k7 is a constant defined in [4].
Lemma 4: The interference graph can be vertex-colored
with at most O(na(n)) colors.
Proof. We present the detailed proof in [9].
We need to schedule the interfering nodes either on different
channels, or at different mini-slots on the same channel since
two nodes assigned the same vertex-color do not interfere with
each other, while two nodes stained with different colors may
interfere with each other. We divide each edge-color slot into
⌈k7 na(n)/CA ⌉ mini-slots on every channel, and assign the
mini-slots on each channel from 1 to ⌈k7 na(n)/CA ⌉. A node
assigned with a color s, 1 ≤ s ≤ k7 na(n), is allowed to
transmit in mini-slot ⌈s/CA ⌉ on channel (s mod CA ) + 1.
We next have the constructive lower bounds of the capacity.
Proposition 5: The achievable per-node throughput capacity λa contributed by ad hoc communications is as follows.
1) When Connectivity requirement dominates, λa is
A
Ω( H 3 CnW
) bits/sec;
2
A log n
2) When Interference requirement dominates, λa is
nWA
Ω(
) bits/sec;
1
3
H 3 CA2 log 2 n
3) When Destination-bottleneck requirement dominates, λa
3
is Ω(
n 2 log log(H 2 log n)WA
3
CA H 3 log 2 n·log(H 2 log n)
) bits/sec;
4) When Interface-bottleneck requirement dominates, λa is
A
Ω( W
CA ).
1
Proof. Since each edge-color slot with a length of Ω( H 3 a(n)
)
m
l
k7 na(n)
mini-slots over every chanseconds is divided into
CA
m
l
1
nel, each mini-slot has a length of Ω(( H 3 a(n)
)
)/ k7 na(n)
CA
A
seconds. Since each channel can transmit at the rate of W
CA
WAl
m
bits/sec, in each mini-slot, λa = Ω(
k na(n) )
(CA H 3 a(n)· 7 C
A
l
m
k7 na(n)
bits can be transported. Since k7 na(n)
≤
+ 1,
CA
CA
WA
we have, λa = Ω( k7 H 3 a2 (n)n+H
3 a(n)C ) bits/sec. Thus,
A
WA
WA
λa = Ω(M INO ( H 3 a2 (n)n , H 3 a(n)C
))
bits/sec (where
A
M INO (f (n), g(n)) is equal to f (n) if f (n) = O(g(n));
otherwise it is equal to g(n)).
Recall
that
a(n)
is
set
to
1
min(max(
3
3
2
2
100CA2 log n log 2 n
, 1 ), log3 n·log(H 2 log n) ).
n
n 2 ·log log(H log n)
CA2 n
Substituting the three values to λa , we have the results
1), 2) and 3). Besides, each interface can transmit or receive
WA
A
at the rate of W
CA bits/sec. Thus, λa = Ω( CA ), which is the
result 4).
D. Summary
It is shown in [6] that the total traffic of ad hoc communications is nπH 2 r2 (n)λA . Combining Propositions 1, 2, 3, 4
and 5 leads to the following theorem.
Theorem 1: The aggregate throughput capacity of the network contributed by ad hoc communications is
1) When Connectivity requirement dominates, TA is
A
) bits/sec.
Θ( HCnW
A log n
2) When Interference requirement dominates, TA is
Θ( 1 nWA 1 ) bits/sec.
2 H log 2 n
CA
3) When Destination-bottleneck requirement dominates,
3
TA is Θ(
n 2 log log(H 2 log n)WA
1
CA H log 2 n·log(H 2 log n)
) bits/sec.
4) When Interface-bottleneck requirement dominates, TA is
A
Θ(H 2 log n · W
CA ) bits/sec.
We then derive the average delay of an MC-IS network and
have the following result.
Theorem 2: Under the H-max-hop ad hoc routing strategy,
if the packets are transmitted in the ad hoc mode and along
a route which approximates the straight line connecting the
source and the destination, the average delay is Θ(H).
Proof. The average delay of the packets transmitted in the ad
hoc mode under the H-max-hop routing strategy in an SC-IS
network is bounded by Θ(H) [6], which also holds for an
MC-IS network since both an SC-IS network and an MC-IS
network have the same routing strategy.
V. C ONCLUSION
In this paper, we propose a novel multi-channel wireless
network with infrastructure (named an MC-IS network), which
consists of common nodes, each with a single interface, and
infrastructure nodes, each with multiple interfaces. We derive
the upper bounds and lower bounds on the capacity of an
MC-IS network contributed by ad hoc communications, where
the upper bounds are proved to be tight. We also prove that
the average delay contributed by ad hoc communications is
bounded by H, which is the maximum number of hops in
H-max routing scheme.
There are some interesting questions in this new type of
networks: (1) what are the upper bounds on the capacity of an
MC-IS network contributed by infrastructure communications?
(2) are the upper bounds also tight? (3) what is the average
delay of an MC-IS network with considering both ad hoc
communications and infrastructure communications? To solve
the above questions would be one of our future works.
VI. ACKNOWLEDGMENT
The work described in this paper was supported by Macao
Science and Technology Development Fund under Grant No.
036/2011/A and Grant No. 081/2012/A3. The authors would
like to thank Gordon G.-D. Han for his constructive comments.
R EFERENCES
[1] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE
Transactions on Information Theory, vol. 46, no. 2, pp. 388 – 404, 2000.
[2] B. Liu, Z. Liu, and D. Towsley, “On the Capacity of Hybrid Wireless
Networks,” in Proc. of IEEE INFOCOM, 2003.
[3] U. C. Kozat and L. Tassiulas, “Throughput capacity of random ad hoc
networks with infrastructure support,” in Proc. of ACM MobiCom, 2003.
[4] P. Kyasanur and N. H. Vaidya, “Capacity of multichannel wireless
networks: Impact of number of channels and interfaces,” in Proc. of
ACM MobiCom, 2005.
[5] A. Zemlianov and G. D. Veciana, “Capacity of ad hoc wireless networks
with infrastructure support,” IEEE JSAC, vol. 23, p. 657, 2005.
[6] P. Li, C. Zhang, and Y. Fang, “Capacity and delay of hybrid wireless
broadband access networks,” IEEE JSAC, vol. 27, pp. 117–125, 2009.
[7] A. Gamal, J. Mammen, B. Prabhakar, and D. Shah, “Throughput-delay
trade-off in wireless networks,” in INFOCOM, 2004.
[8] M. Raab and A. Steger, “Balls into bins - A simple and tight analysis,”
Lecture Notes in Computer Science, vol. 1518, pp. 159–170, 1998.
[9] H.-N. Dai, R. C.-W. Wong, and Q. Zhao, “Multi-channel wireless
networks with infrastructure support: Capacity and delay,” Tech. Rep.,
Feb. 2014. [Online]. Available: http://arxiv.org/pdf/1310.1530v2.pdf
[10] D. B. West, Introduction to graph theory, 2nd ed. Upper Saddle River,
N.J.: Prentice Hall PTR, 2001.