12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

162 <strong>Wireless</strong> <strong>Ad</strong> <strong>Hoc</strong> <strong>and</strong> <strong>Sensor</strong> <strong>Networks</strong>Here, the congestion controller operates at the packet level, whereas theadmission controller works at the source level. These two controllers operateat two time scales <strong>and</strong> their interaction has to be carefully studied to avoidany instability <strong>and</strong> performance deterioration. Here, we propose a hybridsystem theoretic approach to arrive at the overall network stability.Because the packets arrive at discrete intervals, their transmission overthe network is modeled as a continuous fluid flow behavior, <strong>and</strong> thecommunication among the end systems is via messaging, which is adiscrete-event system; a hybrid system theory is required to analyze theoverall stability of the congestion <strong>and</strong> admission control schemes. In theproposal, the admission controller design, expressed as a matrix-baseddiscrete-event controller (DE), provides a framework for rigorous analysisof the DE system including its structure, protocols, <strong>and</strong> overall stability.It is described by the following equations, where k st<strong>and</strong>s for the kth event<strong>and</strong> z(k) is the state of the admission controller, ( z(k) is the negation ofz(k)), which is written as:where,zk ( + 1) = J v ( k) + J v ( k) + J v ( k) + J u ( k), (4.30)s s r r c c u sv<strong>and</strong> the task complete equation isvvsrc= Szk ( ),s= S zk ( ),r= Szk ( ),c(4.31)yk ( ) = Syzk( ). (4.32)Equation 4.30 through Equation 4.32 are logical equations. Input u s (k)represents the sources waiting to get admitted <strong>and</strong> y represents the sourcesthat ended transmission. The controller state equation (Equation 4.30) is a setof rules, so that it is formally a rule base. The coefficient matrices, J s , J r , J c , <strong>and</strong>J u are referred to as b<strong>and</strong>width availability, resource availability, congestionprediction, <strong>and</strong> admission request matrices, which are sparse so that realtimecomputations are easy for such a large interconnected DE system. Therules can be fired using an efficient Rete algorithm. The overbar in Equation4.30 denotes logical negation (e.g., sources that have completed transmissionsare denoted by ‘0’). The other matrices, Ss, Sr,Sc, are b<strong>and</strong>width, resourcerelease, <strong>and</strong> congestion prediction matrices, whereas S y represents the sourcecompletion matrix. Finally, all the matrix operations are defined in the ‘maxmin,’‘or,’ <strong>and</strong> ‘<strong>and</strong>’ algebra. These matrices are created based on the initialstate of the network <strong>and</strong> updated with time <strong>and</strong> are not discussed in detailbecause of space limitations .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!