Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...
Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...
Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
212 T. Chu and I. Nikolaidisenergy demands. Clearly, <strong>in</strong> reality, not all nodes are expected to place the sameload burden on a wireless network. One cannot discount the value of nodes thatpotentially forward traffic but do not <strong>in</strong>troduce their own traffic (or lots of theirown traffic). In this sense, even if the asymptotic dim<strong>in</strong>ish<strong>in</strong>g returns of spatialreuse dom<strong>in</strong>ate, the scale of the network at which the <strong>in</strong>troduced load dom<strong>in</strong>atesover space reuse may be sufficiently large for most applications. What becomesevident at this po<strong>in</strong>t is that the allocation of source-dest<strong>in</strong>ation demands onactual paths <strong>in</strong> a wireless network, specifically <strong>in</strong> an ad hoc network, has notbeen widely studied as a function of the source-dest<strong>in</strong>ation loads. The conceptof a load matrix is certa<strong>in</strong>ly old and quite heavily used <strong>in</strong> circuit switch<strong>in</strong>gnetworks [3]. We will use it <strong>in</strong> the context of path establishment <strong>in</strong> a packetswitch<strong>in</strong>gwireless network. The idea is to assign all the source-dest<strong>in</strong>ation paths<strong>in</strong> an ad hoc network, such that their global (over all nodes) energy demandsare collectively m<strong>in</strong>imized. How packet transmissions take place, at each <strong>in</strong>termediatehop, are left outside the scope of the paper. Suffice is to say that weconsider the existence of an ideal MAC protocol which properly synchronizes thetransmission of compet<strong>in</strong>g nodes without caus<strong>in</strong>g any undue reduction on theeffective capacity. The particular problem of implemented MAC protocols thatprovide coord<strong>in</strong>ated access to the medium <strong>in</strong> order to capitalize on spatial reuseis left outside the scope of the paper, and it is a research topic on its own right,e.g., [4,5].In a wireless environment, each transmission is a local broadcast, that is, itis received <strong>by</strong> more than just the next hop along the path. As such, even thoughnodes outside the path from source to dest<strong>in</strong>ation are un<strong>in</strong>terested <strong>in</strong> the specificpacket (they will neither forward it, nor they are the <strong>in</strong>tended dest<strong>in</strong>ation), theywill nevertheless “hear” it. Assum<strong>in</strong>g the energy required to receive a packetis substantially small, at least compared to transmitt<strong>in</strong>g a packet, overhear<strong>in</strong>gpackets can result <strong>in</strong> a small energy penalty but, more importantly, it results <strong>in</strong>a congestion penalty. That is, the nodes that overhear the packet transmissionshave to refra<strong>in</strong> from us<strong>in</strong>g the medium for their own purposes.Consider a specific node, i, that is with<strong>in</strong> the range of several other nodes.Let us assume that these other nodes transmit traffic of τ i bits per second total.The specific node is liable for forward<strong>in</strong>g some of this received traffic, Θ i bitsper second (clearly Θ i ≤ τ i ). F<strong>in</strong>ally, the node also orig<strong>in</strong>ates some of the traffic(acts as a source) for a load of A i bits per second. From the perspective of thenode, the wireless medium provides a capacity of C bits per second. In orderfor the routes <strong>in</strong> the network to be feasible, the capacity constra<strong>in</strong>t τ i + Θ i +A i ≤ C must be satisfied at each nodes <strong>in</strong> the network. We note however, thatany technique that attempts to m<strong>in</strong>imize energy consumption, will attempt tom<strong>in</strong>imize transmission radii. The result is that energy consumption reduction isexpected to force τ i to be reduced as well, except for the fraction that has tobe absolutely (because of the topology) forwarded <strong>by</strong> node i which implies thatthe least traffic possible as seen from node i is 2Θ + A i ≤C. Nevertheless, τ i alsoreflects the fact that nodes are assigned a particular transmission range to ensurethe connectivity of the network, or more specifically, the existence of paths from