Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks Wireless Ad Hoc and Sensor Networks

12.07.2015 Views

Index 507cluster head, 416, 416example, 392–393, 392–394optimal, 388–390, 388–391, 416selection algorithm, 390–391, 391–393Request-to-send (RTS) frame scenarioalgorithm, DPC, 242channel utilization, 246comparison of protocols, 259design of protocols, 245distributed power control, 234, 239, 242,345, 347dynamic-programming-based rateadaptation, 269efficiency of protocols, 248energy-aware MAC protocol, 347feedback, DPC, 239hidden-terminal problem, 244implementation considering, 275MAC protocol, 29–30, 247, 268NS-2, 33overhead analysis, 247, 322power control, 247protocols, 29–30, 245, 247–248, 259, 268,347simulations, 275sleep mode implementation, 347–348tree topology, 450RESPONSE packetsOEDSR/OEDR comparison, 410relay nodes, 389–390Retransmissions, 240–241RFID, see Radio frequency identificationdevices (RFID)Riccatti equationcost function, 270dynamic-programming-base rateadaptation, 272–274Lyapunov design, LTI feedbackcontrollers, 69rate adaptation, 254Routing, see also Optimized energy-delayrouting (OEDR) protocolad hoc wireless networks, 358–360implementation, 418layer, 418packets, 419quality of service control, 10–11table calculation, 367–371, 369, 372wireless sensor networks, 382,382–385RSSI readings, 288–289, 289RTS, see Request-to-send (RTS) framescenarioSSastry and Bodson studies, 61Sastry and Lam studies, 110–111Scalabilitydiffserv, 2fairness scheduling, 304routing, ad hoc wireless networks,359Scheduling, distributed fairadaptive and distributed fair scheduling,306–323ADFC, 344–346delay guarantee, 318–322energy-aware MAC protocol, 339–353examples, 323–332, 349–353exponentially bounded fluctuation,307fluctuation constrained, 307fundamentals, 303, 353–354future directions, 338generation-4 smart sensor node, 334–335,335guarantee, 310–316hardware, 332–338, 336–338intense traffic, 351–353, 352–353motes, 333–334, 338overhead analysis, 322–323performance evaluation, 323–332predictive congestion control, 446–449protocol development, 308–310quality of service, 303–305random topologies, 326–332, 326–332sensor node hardware, 334, 334–335simulation, 348, 348–353sleep mode, 341–346, 344star topology, 323, 324–325, 326throughput guarantee, 316–318twelve-cluster sensor networks, 349–350,349–351twenty-cluster sensor networks, 350,351–352UMR mote description, 333–334weighted fairness criterion, 305, 305–306Scheduling, energy-aware MAC protocol,344–345, 347Scheme summary, predictive congestioncontrol, 434, 434–435Schurgers studies, 255Second-generation cellular wirelessnetworks, 13Selective backoff, 470–472, 471–472SELECT packet, 419

508 Wireless Ad Hoc and Sensor NetworksSelf-organizationsubnetwork protocol, 385–387, 386wireless sensor networks, 45Sensing application, 418Sensing neighbors, 363–364, 371Sensor data transmission, 341Sensor nodesblockage, 37failure, 37hardware, fair scheduling, 334, 334–335optimized energy-delay subnetworkrouting, 416, 416Service rates, 116SFQ, see Start-time fair queuing (SFQ)Shadowing, fading channels, 213Shakkotai, Yi and, studies, 431Shih studies, 38Signal-to-interference ratio (SIR), see alsoInterferenceactive link protection, 187admission control, 207admission delay, 212Bambos power control scheme, 182channel uncertainties, 235–236cochannel interference, 19constrained second-order power control,182distributed power control, 180–182, 214,346dropped links, 212error dynamics, 215–218, 218fading channels, 215–218, 218, 222, 223,225path loss, 187peer-to-peer networks, 193, 196–197power control implementation, 34protection, active links, 187radio channel uncertainties, 213scheme development, DPC, 214simulations, 348–349state-space-based controls design,183–184totally inadmissible new links, 203–204Signal-to-noise ratio (SNR)abruptly changing channels, 293backoff interval selection, 441channel-state estimation, 261–262cochannel interference, 19decentralized adaptive power control,468–473distributed solution, 467fast updates, 293frequency interference, 464–465hardware, distributed power control,283–284heuristic rate adaptation, 260–261MAC protocol, 268maximum usable rate, 262minimum usable rate, 264network capacity, 21–22OEDSR/OEDR comparison, 410path loss effect, 290–291power update, 468–470protocol comparison, 259rate, power selection, 267rate adaptation, 254, 257reader design, 476selective backoff, 470–471simulations, 348slowly varying interference, 291, 292, 293slow updates, 293transmission cost, 271two-reader model, 466Simulations, see also Algorithmsadaptive ARMAX, 94–95adaptive estimator model, 164bottlenecks, 107–108, 108cross-traffic, 106–107, 106–107discrete-time system, 53distributed power control, 250–253,251–253energy-aware MAC protocol, 348–353extended topology, 107–108, 108, 134–135,134–135fading channels, 222–229fairness, 106–107, 135–137feedback delays, 105, 105–106hybrid congestion control, 163–171mobile ad hoc networks, 32–35MPEG sources, 99–105, 165multiple bottlenecks, 107–108, 108multiple MPEG sources, 99–105multiple ON/OFF sources, 95, 95, 97–99,97–100, 165multiple sources simulation, 128, 130–133,131–133network model, 93–94, 164–165network topology, 123neural network model, 92–93, 93NEW-Reno TCP methodology, 123–124one-hop topology, 276, 276–277one-layer neural network, 94–95outgoing flow variation, 456–457, 457–458parameters, 250–253, 251–253performance, 93–94, 105, 105–106, 124–125predictive congestion control, 449–458

Index 507cluster head, 416, 416example, 392–393, 392–394optimal, 388–390, 388–391, 416selection algorithm, 390–391, 391–393Request-to-send (RTS) frame scenarioalgorithm, DPC, 242channel utilization, 246comparison of protocols, 259design of protocols, 245distributed power control, 234, 239, 242,345, 347dynamic-programming-based rateadaptation, 269efficiency of protocols, 248energy-aware MAC protocol, 347feedback, DPC, 239hidden-terminal problem, 244implementation considering, 275MAC protocol, 29–30, 247, 268NS-2, 33overhead analysis, 247, 322power control, 247protocols, 29–30, 245, 247–248, 259, 268,347simulations, 275sleep mode implementation, 347–348tree topology, 450RESPONSE packetsOEDSR/OEDR comparison, 410relay nodes, 389–390Retransmissions, 240–241RFID, see Radio frequency identificationdevices (RFID)Riccatti equationcost function, 270dynamic-programming-base rateadaptation, 272–274Lyapunov design, LTI feedbackcontrollers, 69rate adaptation, 254Routing, see also Optimized energy-delayrouting (OEDR) protocolad hoc wireless networks, 358–360implementation, 418layer, 418packets, 419quality of service control, 10–11table calculation, 367–371, 369, 372wireless sensor networks, 382,382–385RSSI readings, 288–289, 289RTS, see Request-to-send (RTS) framescenarioSSastry <strong>and</strong> Bodson studies, 61Sastry <strong>and</strong> Lam studies, 110–111Scalabilitydiffserv, 2fairness scheduling, 304routing, ad hoc wireless networks,359Scheduling, distributed fairadaptive <strong>and</strong> distributed fair scheduling,306–323ADFC, 344–346delay guarantee, 318–322energy-aware MAC protocol, 339–353examples, 323–332, 349–353exponentially bounded fluctuation,307fluctuation constrained, 307fundamentals, 303, 353–354future directions, 338generation-4 smart sensor node, 334–335,335guarantee, 310–316hardware, 332–338, 336–338intense traffic, 351–353, 352–353motes, 333–334, 338overhead analysis, 322–323performance evaluation, 323–332predictive congestion control, 446–449protocol development, 308–310quality of service, 303–305r<strong>and</strong>om topologies, 326–332, 326–332sensor node hardware, 334, 334–335simulation, 348, 348–353sleep mode, 341–346, 344star topology, 323, 324–325, 326throughput guarantee, 316–318twelve-cluster sensor networks, 349–350,349–351twenty-cluster sensor networks, 350,351–352UMR mote description, 333–334weighted fairness criterion, 305, 305–306Scheduling, energy-aware MAC protocol,344–345, 347Scheme summary, predictive congestioncontrol, 434, 434–435Schurgers studies, 255Second-generation cellular wirelessnetworks, 13Selective backoff, 470–472, 471–472SELECT packet, 419

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!