2009 IEEE International Symposium on Information Theory 2009
DOI: 10.1109/isit.2009.5205883
|View full text |Cite
|
Sign up to set email alerts
|

Optimal code length for bursty sources with deadlines

Abstract: Data transmission over a discrete memoryless channel is considered when the arrival of data is bursty and is subject to a delay deadline. An exponential decay of the probability of delay violation with respect to a large delay deadline is proved when the block length scales linearly with the deadline. When considered in conjunction with Gallager's error exponents, the first natural consequence of this result is a separation principle: a separated scheme of buffering traffic and blockcoding transmissions achiev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…In our work, we address both online and batch-to-batch approaches and provide a queueing-theoretic analysis, where average delay and average energy consumption as a function of the link erasure probabilities and the arrival rates at each node are analyzed. We then assume that all terminals cannot send and receive at the same time, which is an extension of the results for the point-to-point case [11], [12] to multihop networks. We show that there is an optimal number of coded data packets at each node, for example in terms of average completion time or energy, to be sent before stopping to listen, and devise an efficient algorithm to find these values.…”
Section: Introductionmentioning
confidence: 99%
“…In our work, we address both online and batch-to-batch approaches and provide a queueing-theoretic analysis, where average delay and average energy consumption as a function of the link erasure probabilities and the arrival rates at each node are analyzed. We then assume that all terminals cannot send and receive at the same time, which is an extension of the results for the point-to-point case [11], [12] to multihop networks. We show that there is an optimal number of coded data packets at each node, for example in terms of average completion time or energy, to be sent before stopping to listen, and devise an efficient algorithm to find these values.…”
Section: Introductionmentioning
confidence: 99%