12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

494 <strong>Wireless</strong> <strong>Ad</strong> <strong>Hoc</strong> <strong>and</strong> <strong>Sensor</strong> <strong>Networks</strong>Lyapunov techniques <strong>and</strong> properties, 59,61–65, 67–75mathematical background, 53–57matrix norms, 53–56nonautonomous systems, 69–72, 71nonlinear stability analysis <strong>and</strong> controlsdesign, 60–75properties, 57–60stability analysis, 67–68vector norms, 53–56Dynamic backoff intervals, 309, 309–310Dynamic-programming-base rate adaptationapproximating cost function, 271–272buffer occupancy state equation, 269cost function, 270–272fundamentals, 268–269implementation, 275modulation selection, 274–275queue occupancy cost, 270Riccatti equation, 272–274transmission cost, 270–271Dynamic weight adaptationadaptive <strong>and</strong> distributed fair scheduling,308–309adaptive congestion control, 447energy-aware MAC protocol, 345Dziong studies, 148EECN, see Explicit congestion notification(ECN)EDGE, 14Effective power control schemes, 21Efficiency of protocolpower control MAC protocol, 248routing, ad hoc wireless networks, 359El-osery <strong>and</strong> Abdullah studies, 196End-to-end congestion controller designcontroller structure, 116–117control scheme, 113–120fundamentals, 108–111network model, 111, 111–113quality of service, 117–120stability analysis, 114–116weight updates, 117–120Energy-aware MAC protocolADFC with sleep mode, 344–346algorithms, 344–345backoff interval calculation, 345comparison of protocols, 342, 342–343delivery of data, 341–342distributed power <strong>and</strong> control <strong>and</strong> reset,345–346distributed power control, 347dynamic weight adaptation, 345examples, 349–353fundamentals, 339–341, 346–348implementation of protocols, 345protocols, 342, 342–343, 345, 347scheduling, 344–345, 347sensor data transmission, 341simulation, 348–353sleep mode, 341–348traffic, 351–353, 352–353twelve-cluster sensor networks, 349–350,349–351twenty-cluster sensor networks, 350,351–352Energy-delay information declaration, 367,371–372, see also Optimizedenergy-delay routing (OEDR) protocolEnergy-delay metric calculation, 363–364,see also Optimized energy-delayrouting (OEDR) protocolEngels studies, 462Error dynamics, fading channels, 215–218,218Esler studies, 383Estimator structure, 154, 154–155Evaluationsfading channels, 222, 225–226RFID reader networks, 477, 477Examplesadmission delay evaluation, 208, 211, 212bottlenecks, multiple, 107–108, 108boundedness, 73–74closed-loop systems, 74–75controller design, 66–67cross-traffic presence, 106–107, 106–107decrescent function, 70–72discrete-time systems, 52–53distributed power control evaluations,222, 225dropped links, 208, 211, 212energy-aware MAC protocol, 349–353extended topology, 107–108, 108fading channels, 222, 225fairness, 351–353, 352–353four nodes, 293–296global stability, 64hybrid congestion control, 167–170intense traffic, 351–353, 352–353linear systems with disturbance, 73–74local stability, 64

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!