12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index 509r<strong>and</strong>om topology, 278–279, 279rate adaptation, 250–253, 251–253RFID reader networks, 476–483single source simulation, 125, 126–130,128threshold methodology, 94traffic rate controller design, 92–96traffic sources, 95–96, 123, 165–166tree topology, 449–454, 450–454two-hop topology, 276–278, 277–278,279–282, 280–282unbalanced tree topology, 454–456,455–456VBR sources, 96, 100Sin, Goodwin <strong>and</strong>, studies, 57, 61Singh <strong>and</strong> Raghavendra studies, 234, 250, 339Single data frame scenario, 247Single source simulation, 125, 126–130, 128Singular value decomposition, 55SIR, see Signal-to-interference ratio (SIR)Sivakumar, Park <strong>and</strong>, studies, 234–235, 468Sivakumar studies, 359Sleep mode, 341–348Slotine <strong>and</strong> Li studies, 61Slowly varying channels, 225Slowly varying interference, 291, 292, 293Slow uptake, 293, 293–294Smart environments, 42–43Smart sensors, 42SNR, see Signal-to-noise ratio (SNR)Software architecturehardware, 287, 287–290optimized energy-delay subnetworkrouting, 417–419, 418Sousa, Hashem <strong>and</strong>, studies, 213, 234Spatial reuse factor, 246Spohn, Aceves <strong>and</strong>, studies, 359Stabilityapproximation property, 83asymptotic, 58, 71autonomous systems, 61–65boundedness, 72–75closed-loop systems, 74–75controller design, 65–67decrescent function, 70–72end-to-end congestion control scheme,114–116feedback controllers, 68–69fundamentals, 60global stability, 63linear systems, 67, 73–74local stability, 63LTI feedback controllers, 68–69Lyapunov techniques <strong>and</strong> properties,61–72nonautonomous systems, 69–72, 71stability analysis, 67–68Stallings studies, 1–2, 4–5, 9–10St<strong>and</strong>ardsad hoc networks, 28available bit rate, 3cellular wireless networks, 12–15, 14, 16dynamic backoff intervals, 309fairness, 330, 332hardware implementation, 332IEEE 802.16, 12MAC protocol, 28–31, 29–30mobile ad hoc networks, 25–31network types, 26, 28physical layer specification, 25–26power control implementation, 33RFID reader networks, 467smart sensors, 42tree topology, 450–452unbalanced tree topology, 455–456versions, 26, 27Star topology, 323, 324–325, 326Start-time fair queuing (SFQ), 308, 344State-space-based controls design, 183–189Stationary nodes, 396–402, 399–402Stationary users, 222, 223–224, 225Subnetwork protocol, 385–387, 386, see alsoOptimized energy-delay subnetworkrouting (OEDSR) protocolSuda, Bae <strong>and</strong>, studies, 81, 111, 147–149Syrmos, Lewis <strong>and</strong>, studies, 69TTalluri, Jagannathan <strong>and</strong>, studiesadaptive ARMAX method, 94–95admission, 161ATM network congestion control, 81end-to-end congestion controller design,109–110network modeling, 87traffic sources, 165VBR sources, 96weight initialization <strong>and</strong> online learning,90Tan, Johari <strong>and</strong>, studies, 110Tanenbaum studies, 1TDMA systemsenergy-aware MAC protocol, 339network capacity, 20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!