Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks Wireless Ad Hoc and Sensor Networks

12.07.2015 Views

IndexAAbdallah, El-osery and, studies, 196Abdallah and Dawson, Lewis, studies, 53,57, 60Abruptly changing channels, 293, 293–294Absolute geographical positioning, 45Abstraction layer, 418Aceves and Spohn studies, 359Acknowledgment (ACK) frames andpacketsalgorithm, DPC, 242design of protocol, 245distributed power control, 234–235,345–347efficiency of protocol, 248end-to-end congestion controller design,109energy-aware MAC protocol, 347feedback, DPC, 239–240hidden-terminal problem, 244MAC protocol, 29–31, 247, 268memory limitations, 419NS-2, 33, 120optimized energy-delay subnetworkrouting, 419overhead analysis, 247, 322power control, 243, 247sleep mode implementation, 347–348tree topology, 450Active linksadmission control, 204–206path loss, 187Active transmission power control, 32Adaptive and distributed fair scheduling(ADFS)delay guarantee, 318–322dynamic backoff intervals, 309, 309–310dynamic weight adaptation, 308–309exponentially bounded fluctuation, 307fairness guarantee, 310–316fair scheduling, 446–447fluctuation constrained, 307fundamentals, 306MAC protocol, 309–310overhead analysis, 322–323protocol development, 308–310throughput guarantee, 316–318Adaptive and probabilistic power controlanalysis, simulation, 477–483, 478–483decentralized adaptive power control,467–473distributed selection, 467distribution adaptation, 474, 475–476evaluation metrics, 477, 477fundamentals, 461–463, 483–484mathematical relations, 463–465parameters, simulation, 476–477power distribution, 473–475, 474power update, 468–470probabilistic power control, 473–476problem formulation, 463–467reader design, 476selective backoff, 470–472, 471–472simulation, 476–483standards, 467two-reader model, 465–467, 466Adaptive ARMAX method, 94–95, see alsoARMAX modelAdaptive backoff interval selection,442–446Adaptive congestion controladaptive backoff interval selection,442–446backoff interval selection, 440–446buffer occupancy, 436–440, 437dynamic weight adaptation, 447fair scheduling, 446–449fundamentals, 436rate propagation, 446rate selection, 436–440, 437throughput guarantee, 447–449Adaptive estimator model, 164Adaptive scheme development, 218–221,220–221Adaptive timeout-based voluntarydropout, 205Adaptive traffic estimator design, 153–157Additive increase and multiplicativedecrease (AIMD) algorithm, 109–110487

488 Wireless Ad Hoc and Sensor NetworksADFC with sleep mode, 344–346ADF7020 ISM band receiver, 286, 286Ad hoc networks, see also Wireless ad hocnetworksdistributed power control implementation,240, 240mobile ad hoc networks, 28Admission controldistributed power control, 200–212hybrid congestion control, 159–163, 160quality of service control, 8–9Admission controller algorithm, 206–212Admission controller designadaptive estimator model, 164adaptive traffic estimator design, 153–157admission control, 159–163, 160bandwidth, 157–159estimator structure, 154, 154–155examples, 167–170fundamentals, 147–150, 171guaranteed estimation, 155–157network model, 150–151, 150–153,164–165simulation, 163–171traffic sources, 165–166weight updates, 155–157Admission delay evaluation, 208, 211, 212Aein studies, 178, 213AIMD, see Additive increase and multiplicativedecrease (AIMD) algorithmAkaiwa, Canchi and, studies, 213–214, 236Akyildiz studies, 37–39Alavi and Nettleton studies, 178Algorithms, see also Simulationsadditive increase and multiplicativedecrease (AIMD), 109admission controller, 206–212Bellman Ford, 384distributed power control implementation,240, 240–242energy-aware MAC protocol, 344–345overallocation, 158relay-node selection, 390–394, 391–393routing table, 370–371, 370–371, 372Analysis simulation, RFID reader networks,477–483, 478–483Angel and Bellman studies, 256Antsaklis studies, 163Approximating cost function, 271–272Approximation propertynetwork modeling, 83–88, 84–85neural networks, 82–83stability of systems, 83APTEEN protocol, 383Architecturehardware, 284–287optimized energy-delay subnetworkrouting, 416–419, 418sensor network communication,38–39ARMAX model, 164, see also AdaptiveARMAX methodArrival rates, 116Asymptotic stability, 58, 71ATM and Internet networks, congestioncontrolapproximation property, 82–88bottlenecks, multiple, 107–108, 108controller structure, 89, 89–91control scheme, 113–120cross-traffic presence, 106–107, 106–107end-to-end congestion controller design,108–120extended topology, 107–108, 108, 134–135,134–135fairness, 106–107, 106–107, 135–137,136–138fundamentals, 79–82, 138–139implementation, 120–122multiple bottlenecks, 107–108, 108multiple MPEG sources, 99–105multiple ON/OFF sources, 97–99, 97–100multiple sources simulation, 128, 130–133,131–133network modeling, 83–88, 84–85, 111,111–113network topology, 123neural networks, 82–83New-Reno TCP methodology,123–124NS-2 implementation, 120–122, 121overhead analysis, 122performance, 105, 105–106, 124–125simulation, 92–96, 123–138single source simulation, 125, 126–130,128stability of systems, 83traffic rate controller design, 88–108traffic sources, 123weight updates, 91–92ATM networkscategory attributes, 7quality of service parameters, 6–7traffic impact, 2–3Autonomous systems, 60–65Available bit rate standard, 3

IndexAAbdallah, El-osery <strong>and</strong>, studies, 196Abdallah <strong>and</strong> Dawson, Lewis, studies, 53,57, 60Abruptly changing channels, 293, 293–294Absolute geographical positioning, 45Abstraction layer, 418Aceves <strong>and</strong> Spohn studies, 359Acknowledgment (ACK) frames <strong>and</strong>packetsalgorithm, DPC, 242design of protocol, 245distributed power control, 234–235,345–347efficiency of protocol, 248end-to-end congestion controller design,109energy-aware MAC protocol, 347feedback, DPC, 239–240hidden-terminal problem, 244MAC protocol, 29–31, 247, 268memory limitations, 419NS-2, 33, 120optimized energy-delay subnetworkrouting, 419overhead analysis, 247, 322power control, 243, 247sleep mode implementation, 347–348tree topology, 450Active linksadmission control, 204–206path loss, 187Active transmission power control, 32<strong>Ad</strong>aptive <strong>and</strong> distributed fair scheduling(ADFS)delay guarantee, 318–322dynamic backoff intervals, 309, 309–310dynamic weight adaptation, 308–309exponentially bounded fluctuation, 307fairness guarantee, 310–316fair scheduling, 446–447fluctuation constrained, 307fundamentals, 306MAC protocol, 309–310overhead analysis, 322–323protocol development, 308–310throughput guarantee, 316–318<strong>Ad</strong>aptive <strong>and</strong> probabilistic power controlanalysis, simulation, 477–483, 478–483decentralized adaptive power control,467–473distributed selection, 467distribution adaptation, 474, 475–476evaluation metrics, 477, 477fundamentals, 461–463, 483–484mathematical relations, 463–465parameters, simulation, 476–477power distribution, 473–475, 474power update, 468–470probabilistic power control, 473–476problem formulation, 463–467reader design, 476selective backoff, 470–472, 471–472simulation, 476–483st<strong>and</strong>ards, 467two-reader model, 465–467, 466<strong>Ad</strong>aptive ARMAX method, 94–95, see alsoARMAX model<strong>Ad</strong>aptive backoff interval selection,442–446<strong>Ad</strong>aptive congestion controladaptive backoff interval selection,442–446backoff interval selection, 440–446buffer occupancy, 436–440, 437dynamic weight adaptation, 447fair scheduling, 446–449fundamentals, 436rate propagation, 446rate selection, 436–440, 437throughput guarantee, 447–449<strong>Ad</strong>aptive estimator model, 164<strong>Ad</strong>aptive scheme development, 218–221,220–221<strong>Ad</strong>aptive timeout-based voluntarydropout, 205<strong>Ad</strong>aptive traffic estimator design, 153–157<strong>Ad</strong>ditive increase <strong>and</strong> multiplicativedecrease (AIMD) algorithm, 109–110487

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!