12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IndexAAbdallah, El-osery <strong>and</strong>, studies, 196Abdallah <strong>and</strong> Dawson, Lewis, studies, 53,57, 60Abruptly changing channels, 293, 293–294Absolute geographical positioning, 45Abstraction layer, 418Aceves <strong>and</strong> Spohn studies, 359Acknowledgment (ACK) frames <strong>and</strong>packetsalgorithm, DPC, 242design of protocol, 245distributed power control, 234–235,345–347efficiency of protocol, 248end-to-end congestion controller design,109energy-aware MAC protocol, 347feedback, DPC, 239–240hidden-terminal problem, 244MAC protocol, 29–31, 247, 268memory limitations, 419NS-2, 33, 120optimized energy-delay subnetworkrouting, 419overhead analysis, 247, 322power control, 243, 247sleep mode implementation, 347–348tree topology, 450Active linksadmission control, 204–206path loss, 187Active transmission power control, 32<strong>Ad</strong>aptive <strong>and</strong> distributed fair scheduling(ADFS)delay guarantee, 318–322dynamic backoff intervals, 309, 309–310dynamic weight adaptation, 308–309exponentially bounded fluctuation, 307fairness guarantee, 310–316fair scheduling, 446–447fluctuation constrained, 307fundamentals, 306MAC protocol, 309–310overhead analysis, 322–323protocol development, 308–310throughput guarantee, 316–318<strong>Ad</strong>aptive <strong>and</strong> probabilistic power controlanalysis, simulation, 477–483, 478–483decentralized adaptive power control,467–473distributed selection, 467distribution adaptation, 474, 475–476evaluation metrics, 477, 477fundamentals, 461–463, 483–484mathematical relations, 463–465parameters, simulation, 476–477power distribution, 473–475, 474power update, 468–470probabilistic power control, 473–476problem formulation, 463–467reader design, 476selective backoff, 470–472, 471–472simulation, 476–483st<strong>and</strong>ards, 467two-reader model, 465–467, 466<strong>Ad</strong>aptive ARMAX method, 94–95, see alsoARMAX model<strong>Ad</strong>aptive backoff interval selection,442–446<strong>Ad</strong>aptive congestion controladaptive backoff interval selection,442–446backoff interval selection, 440–446buffer occupancy, 436–440, 437dynamic weight adaptation, 447fair scheduling, 446–449fundamentals, 436rate propagation, 446rate selection, 436–440, 437throughput guarantee, 447–449<strong>Ad</strong>aptive estimator model, 164<strong>Ad</strong>aptive scheme development, 218–221,220–221<strong>Ad</strong>aptive timeout-based voluntarydropout, 205<strong>Ad</strong>aptive traffic estimator design, 153–157<strong>Ad</strong>ditive increase <strong>and</strong> multiplicativedecrease (AIMD) algorithm, 109–110487

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!