12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

490 <strong>Wireless</strong> <strong>Ad</strong> <strong>Hoc</strong> <strong>and</strong> <strong>Sensor</strong> <strong>Networks</strong>Chang, Cheng <strong>and</strong> studies, 81Chang <strong>and</strong> Chang studies, 94Channel assignment, 22Channel-state estimation, 261–262Channel uncertainties, 235–237Channel utilization, 243, 246Chao <strong>and</strong> Guo studies, 1Cha studies, 283–284, 461–462, 467Chen <strong>and</strong> Chang studies, 109Cheng <strong>and</strong> Chang studies, 81Cheng studies, 148Chen studies, 81, 148Clausen <strong>and</strong> Jacquet studies, 357, 359–361,363Clear-to-send (CTS) frame scenarioalgorithm, DPC, 240channel utilization, 246comparison of protocols, 259design of protocols, 245distributed power control, 234, 239–241,345, 347dynamic-programming-based rateadaptation, 269efficiency of protocols, 248energy-aware MAC protocol, 347feedback, DPC, 239hidden-terminal problem, 244implementation considering, 275MAC protocol, 29–30, 247, 268NS-2, 33overhead analysis, 247, 322power control, 247protocols, 29–30, 245, 247–248, 259, 268,347simulations, 275sleep mode implementation, 347–348tree topology, 450Closed-loop systems, 74–75Closest peers, 41–42Cluster, 18Cluster head, 416, 416Cochannel interference, 19–20CODA, see Congestion Detection <strong>and</strong>Avoidance (CODA) protocolCommercial systems, 43–45Computer networksATM networks, 6–7, 7differentiated services, 5–6fundamentals, 1–4integrated services, 4–5Internet networks, 6–7multiprotocol label switching, 6quality of service, 6–11Congestion, heuristic rate adaptation,265–266Congestion control, adaptiveadaptive backoff interval selection,442–446backoff interval selection, 440–446buffer occupancy, 436–440, 437dynamic weight adaptation, 447fair scheduling, 446–449fundamentals, 436rate propagation, 446rate selection, 436–440, 437throughput guarantee, 447–449Congestion control, ATM networks <strong>and</strong>Internetapproximation property, 82–88bottlenecks, multiple, 107–108, 108controller structure, 89, 89–91control scheme, 113–120cross-traffic presence, 106–107, 106–107end-to-end congestion controller design,108–120extended topology, 107–108, 108, 134–135,134–135fairness, 106–107, 106–107, 135–137,136–138fundamentals, 79–82, 138–139implementation, 120–122multiple bottlenecks, 107–108, 108multiple MPEG sources, 99–105multiple ON/OFF sources, 97–99, 97–100multiple sources simulation, 128, 130–133,131–133network modeling, 83–88, 84–85, 111,111–113network topology, 123neural networks, 82–83New-Reno TCP methodology, 123–124NS-2 implementation, 120–122, 121overhead analysis, 122performance, 105, 105–106, 124–125simulation, 92–96, 123–138single source simulation, 125, 126–130,128stability of systems, 83traffic rate controller design, 88–108traffic sources, 123weight updates, 91–92Congestion control, hybrid approachadaptive estimator model, 164adaptive traffic estimator design, 153–157admission control, 159–163, 160b<strong>and</strong>width, 157–159

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!