13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

212 T. Chu and I. Nikolaidisenergy demands. Clearly, <strong>in</strong> reality, not all nodes are expected to place the sameload burden on a wireless network. One cannot discount the value of nodes thatpotentially forward traffic but do not <strong>in</strong>troduce their own traffic (or lots of theirown traffic). In this sense, even if the asymptotic dim<strong>in</strong>ish<strong>in</strong>g returns of spatialreuse dom<strong>in</strong>ate, the scale of the network at which the <strong>in</strong>troduced load dom<strong>in</strong>atesover space reuse may be sufficiently large for most applications. What becomesevident at this po<strong>in</strong>t is that the allocation of source-dest<strong>in</strong>ation demands onactual paths <strong>in</strong> a wireless network, specifically <strong>in</strong> an ad hoc network, has notbeen widely studied as a function of the source-dest<strong>in</strong>ation loads. The conceptof a load matrix is certa<strong>in</strong>ly old and quite heavily used <strong>in</strong> circuit switch<strong>in</strong>gnetworks [3]. We will use it <strong>in</strong> the context of path establishment <strong>in</strong> a packetswitch<strong>in</strong>gwireless network. The idea is to assign all the source-dest<strong>in</strong>ation paths<strong>in</strong> an ad hoc network, such that their global (over all nodes) energy demandsare collectively m<strong>in</strong>imized. How packet transmissions take place, at each <strong>in</strong>termediatehop, are left outside the scope of the paper. Suffice is to say that weconsider the existence of an ideal MAC protocol which properly synchronizes thetransmission of compet<strong>in</strong>g nodes without caus<strong>in</strong>g any undue reduction on theeffective capacity. The particular problem of implemented MAC protocols thatprovide coord<strong>in</strong>ated access to the medium <strong>in</strong> order to capitalize on spatial reuseis left outside the scope of the paper, and it is a research topic on its own right,e.g., [4,5].In a wireless environment, each transmission is a local broadcast, that is, itis received <strong>by</strong> more than just the next hop along the path. As such, even thoughnodes outside the path from source to dest<strong>in</strong>ation are un<strong>in</strong>terested <strong>in</strong> the specificpacket (they will neither forward it, nor they are the <strong>in</strong>tended dest<strong>in</strong>ation), theywill nevertheless “hear” it. Assum<strong>in</strong>g the energy required to receive a packetis substantially small, at least compared to transmitt<strong>in</strong>g a packet, overhear<strong>in</strong>gpackets can result <strong>in</strong> a small energy penalty but, more importantly, it results <strong>in</strong>a congestion penalty. That is, the nodes that overhear the packet transmissionshave to refra<strong>in</strong> from us<strong>in</strong>g the medium for their own purposes.Consider a specific node, i, that is with<strong>in</strong> the range of several other nodes.Let us assume that these other nodes transmit traffic of τ i bits per second total.The specific node is liable for forward<strong>in</strong>g some of this received traffic, Θ i bitsper second (clearly Θ i ≤ τ i ). F<strong>in</strong>ally, the node also orig<strong>in</strong>ates some of the traffic(acts as a source) for a load of A i bits per second. From the perspective of thenode, the wireless medium provides a capacity of C bits per second. In orderfor the routes <strong>in</strong> the network to be feasible, the capacity constra<strong>in</strong>t τ i + Θ i +A i ≤ C must be satisfied at each nodes <strong>in</strong> the network. We note however, thatany technique that attempts to m<strong>in</strong>imize energy consumption, will attempt tom<strong>in</strong>imize transmission radii. The result is that energy consumption reduction isexpected to force τ i to be reduced as well, except for the fraction that has tobe absolutely (because of the topology) forwarded <strong>by</strong> node i which implies thatthe least traffic possible as seen from node i is 2Θ + A i ≤C. Nevertheless, τ i alsoreflects the fact that nodes are assigned a particular transmission range to ensurethe connectivity of the network, or more specifically, the existence of paths from

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!