12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

504 <strong>Wireless</strong> <strong>Ad</strong> <strong>Hoc</strong> <strong>and</strong> <strong>Sensor</strong> <strong>Networks</strong>evaluation metrics, 477, 477fundamentals, 461–463, 483–484mathematical relations, 463–465parameters, simulation, 476–477power distribution, 473–475, 474power update, 468–470probabilistic power control, 473–476problem formulation, 463–467reader design, 476selective backoff, 470–472, 471–472simulation, 476–483st<strong>and</strong>ards, 467two-reader model, 465–467, 466Power control, MAC protocolACK frame scenario, 247channel utilization, 243, 246contention time, 247, 252CTS frame scenario, 247design of protocol, 245efficiency of protocol, 248fundamentals, 242–243hidden-terminal problems, 243–244,243–245minimizing overhead impact, 247–248NS-2 implementation, 249, 249overhead analysis, 247–248RTS frame scenario, 247single data frame scenario, 247Power control, RFID reader networksanalysis, simulation, 477–483, 478–483decentralized adaptive power control,467–473distributed selection, 467distribution adaptation, 474, 475–476evaluation metrics, 477, 477fundamentals, 461–463, 483–484mathematical relations, 463–465parameters, simulation, 476–477power distribution, 473–475, 474power update, 468–470probabilistic power control, 473–476problem formulation, 463–467reader design, 476selective backoff, 470–472, 471–472simulation, 476–483st<strong>and</strong>ards, 467two-reader model, 465–467, 466Power control (distributed)active link protection, 204–206ad hoc networks, 240, 240admission control, 200–212admission controller algorithm, 206–212admission delay evaluation, 208, 211, 212algorithms, 240, 240–242Bambos scheme, 182cellular network applications, 189–200constrained second-order power control,182–183controller scheme development, 214–230dropped links, 208, 211, 212fading channels, 212–230feedback, 239–240fundamentals, 177–179, 230, 239IEEE st<strong>and</strong>ard 802.11, 240, 240mobile users, 192–193, 226, 228–229path loss, 180–200peer-to-peer network, 207–208, 207–210performance evaluation, 225–226, 227power reset, 240–241radio channel uncertainties, 212–214retransmissions, 240–241simulation, 250–253, 251–252state-space-based controls design,183–189transmitter power control, mobile users,192–193, 194–195uplink transmitter power control,189–190, 190–193, 192wireless network applications, 200–212Power control (distributed), path lossactive links, 187Bambos power control scheme, 182bounded power overshoot, 188–189cellular network applications, 189–200constrained second-order power control,182–183fading channels, 213fundamentals, 180–182mobile users, 192–193, 194–195peer-to-peer networks, 193–200SIR protection, 187state-space-based controls design,183–189uplink transmitter power control,189–190, 190–193, 192Power control (distributed), wireless ad hocnetworksabrupt changing channels, 293, 293–294algorithms, 240, 240–242backoff mechanism, 267buffer occupancy state equation, 269channels, 235–237, 243, 246, 261–262comparison of protocols, 257–259,258–259contention time, 247cost function, 270–272

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!