Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks Wireless Ad Hoc and Sensor Networks

12.07.2015 Views

Index 491estimator structure, 154, 154–155examples, 167–170fundamentals, 147–150, 171guaranteed estimation, 155–157network model, 150–151, 150–153,164–165simulation, 163–171traffic sources, 165–166weight updates, 155–157Congestion control, predictiveadaptive congestion control, 436–449backoff interval selection, 440–446buffer occupancy, 436–440, 437fair scheduling, 446–449fundamentals, 429–432mitigation, 433–434outgoing flow variation, 456–457,457–458overview, 432, 432–436performance, 435–436, 456–457, 457–458prediction, 433–434rate selection, 436–440, 437scheme summary, 434, 434–435simulation, 449–458tree topology, 449–454, 450–454unbalanced tree topology, 454–456,455–456Congestion controller design, end-to-endcontroller structure, 116–117control scheme, 113–120fundamentals, 108–111network model, 111, 111–113quality of service, 117–120stability analysis, 114–116weight updates, 117–120Congestion Detection and Avoidance(CODA) protocol, 430–432, 435, 449,455–456Constant bit rate (CBR) service, 2Constant but abruptly changing channels,222, 223–224, 225Constrained second-order power control,182–183Contention time, 247, 252Continuity norms, 56–57Control, see Quality of service (QoS)Controlled-load service, 4Controllers, see also Admission controllerdesignadmission, algorithm, 206–212design, Lyapunov techniques, 65–69end-to-end congestion control scheme,116–117schemes, distributed power control,214–230traffic rate controller design, 89, 89–91Control scheme, end-to-end congestioncontroller structure, 116–117fundamentals, 113–114quality of service, 117–120stability analysis, 114–116weight updates, 117–120Control traffic overhead, 359Corson, Park and, studies, 359Cost function, 270–272Crossbow Berkley Motes, 43–44Cross-traffic presence, 106–107, 106–107CTS, see Clear-to-send (CTS) frame scenarioCuller, Woo and, studies, 234, 339–340DDAPC, see Decentralized adaptive powercontrol (DAPC)DATA frames and packetsalgorithm, DPC, 242comparison of protocols, 259design of protocols, 245distributed power control, 234, 239–240,242, 345–347dynamic-programming-based rateadaptation, 269efficiency of protocols, 248energy-aware MAC protocol, 347feedback, DPC, 239heuristic rate adaptation, 260hidden-terminal problem, 244MAC protocol, 29–30, 268maximum usable rate, 262NS-2, 33optimized energy-delay subnetworkrouting, 419overhead analysis, 247power control, 243protocols, 29–30, 245, 247–248, 259, 347sleep mode implementation, 347–348tree topology, 450Dawson, Lewis, Abdallah and, studies,53, 57, 60Decentralized adaptive power control(DAPC)fundamentals, 467–468implementation, 472, 472–473power update, 468–470selective backoff, 470–472, 471–472

492 Wireless Ad Hoc and Sensor NetworksDecrescent function, 70–72Delay guarantee, 318–322Delivery of data, 341–342Demers studies, 304, 306Designcellular wireless networks, 17–18MAC protocol design, 267power control MAC protocol, 245RFID readers, 476state-space-based controls, 183–189Design, admission controlleradaptive estimator model, 164adaptive traffic estimator design, 153–157admission control, 159–163, 160bandwidth, 157–159estimator structure, 154, 154–155examples, 167–170fundamentals, 147–150, 171guaranteed estimation, 155–157network model, 150–151, 150–153, 164–165simulation, 163–171traffic sources, 165–166weight updates, 155–157Design, end-to-end congestion controllercontroller structure, 116–117control scheme, 113–120fundamentals, 108–111network model, 111, 111–113quality of service, 117–120stability analysis, 114–116weight updates, 117–120Design, nonlinear stability analysis andcontrolsautonomous systems, 61–65boundedness, 72–75closed-loop systems, 74–75controller design, 65–67decrescent function, 70–72feedback controllers, 68–69fundamentals, 60global stability, 63linear systems, 67, 73–74local stability, 63LTI feedback controllers, 68–69Lyapunov techniques and properties,61–72nonautonomous systems, 69–72, 71stability analysis, 67–68Differentiated services (Diffserv), 2, 5–6Diffserv, see Differentiated services (Diffserv)Digital video broadcast (DVB), 12Direct sequence spread spectrum radiophysical layer, 25Discontinuous transmission mode, 21Discrete-time systems, 50, 52–53Distributed adaptive power control, 237–239,see also Distributed power controlDistributed fair schedulingadaptive and distributed fair scheduling,306–323ADFC, 344–346delay guarantee, 318–322energy-aware MAC protocol, 339–353examples, 323–332, 349–353exponentially bounded fluctuation, 307fluctuation constrained, 307fundamentals, 303, 353–354future directions, 338generation-4 smart sensor node, 334–335,335guarantee, 310–316hardware, 332–338, 336–338intense traffic, 351–353, 352–353motes, 333–334, 338overhead analysis, 322–323performance evaluation, 323–332predictive congestion control, 446–449protocol development, 308–310quality of service, 303–305random topologies, 326–332, 326–332sensor node hardware, 334, 334–335simulation, 348, 348–353sleep mode, 341–346, 344star topology, 323, 324–325, 326throughput guarantee, 316–318twelve-cluster sensor networks, 349–350,349–351twenty-cluster sensor networks, 350,351–352UMR mote description, 333–334weighted fairness criterion, 305, 305–306Distributed power and control and reset,345–346Distributed power controlactive link protection, 204–206ad hoc networks, 240, 240admission control, 200–212admission controller algorithm,206–212admission delay evaluation, 208, 211, 212algorithms, 206–212, 240, 240–242Bambos scheme, 182cellular network applications, 189–200constrained second-order power control,182–183controller scheme development, 214–230

492 <strong>Wireless</strong> <strong>Ad</strong> <strong>Hoc</strong> <strong>and</strong> <strong>Sensor</strong> <strong>Networks</strong>Decrescent function, 70–72Delay guarantee, 318–322Delivery of data, 341–342Demers studies, 304, 306Designcellular wireless networks, 17–18MAC protocol design, 267power control MAC protocol, 245RFID readers, 476state-space-based controls, 183–189Design, admission controlleradaptive estimator model, 164adaptive traffic estimator design, 153–157admission control, 159–163, 160b<strong>and</strong>width, 157–159estimator structure, 154, 154–155examples, 167–170fundamentals, 147–150, 171guaranteed estimation, 155–157network model, 150–151, 150–153, 164–165simulation, 163–171traffic sources, 165–166weight updates, 155–157Design, end-to-end congestion controllercontroller structure, 116–117control scheme, 113–120fundamentals, 108–111network model, 111, 111–113quality of service, 117–120stability analysis, 114–116weight updates, 117–120Design, nonlinear stability analysis <strong>and</strong>controlsautonomous systems, 61–65boundedness, 72–75closed-loop systems, 74–75controller design, 65–67decrescent function, 70–72feedback controllers, 68–69fundamentals, 60global stability, 63linear systems, 67, 73–74local stability, 63LTI feedback controllers, 68–69Lyapunov techniques <strong>and</strong> properties,61–72nonautonomous systems, 69–72, 71stability analysis, 67–68Differentiated services (Diffserv), 2, 5–6Diffserv, see Differentiated services (Diffserv)Digital video broadcast (DVB), 12Direct sequence spread spectrum radiophysical layer, 25Discontinuous transmission mode, 21Discrete-time systems, 50, 52–53Distributed adaptive power control, 237–239,see also Distributed power controlDistributed fair schedulingadaptive <strong>and</strong> distributed fair scheduling,306–323ADFC, 344–346delay guarantee, 318–322energy-aware MAC protocol, 339–353examples, 323–332, 349–353exponentially bounded fluctuation, 307fluctuation constrained, 307fundamentals, 303, 353–354future directions, 338generation-4 smart sensor node, 334–335,335guarantee, 310–316hardware, 332–338, 336–338intense traffic, 351–353, 352–353motes, 333–334, 338overhead analysis, 322–323performance evaluation, 323–332predictive congestion control, 446–449protocol development, 308–310quality of service, 303–305r<strong>and</strong>om topologies, 326–332, 326–332sensor node hardware, 334, 334–335simulation, 348, 348–353sleep mode, 341–346, 344star topology, 323, 324–325, 326throughput guarantee, 316–318twelve-cluster sensor networks, 349–350,349–351twenty-cluster sensor networks, 350,351–352UMR mote description, 333–334weighted fairness criterion, 305, 305–306Distributed power <strong>and</strong> control <strong>and</strong> reset,345–346Distributed power controlactive link protection, 204–206ad hoc networks, 240, 240admission control, 200–212admission controller algorithm,206–212admission delay evaluation, 208, 211, 212algorithms, 206–212, 240, 240–242Bambos scheme, 182cellular network applications, 189–200constrained second-order power control,182–183controller scheme development, 214–230

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!