13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Ste<strong>in</strong>er Systems for Topology-TransparentAccess Control <strong>in</strong> MANETsCharles J. Colbourn 1,⋆ , Violet R. Syrotiuk 1,⋆⋆ , and Alan C.H. L<strong>in</strong>g 21 <strong>Computer</strong> <strong>Science</strong> & Eng<strong>in</strong>eer<strong>in</strong>g, Arizona State University, Tempe, AZ 85287-54062 <strong>Computer</strong> <strong>Science</strong>, University of Vermont, Burl<strong>in</strong>gton, VT 05405Abstract. In this paper we exam<strong>in</strong>e the comb<strong>in</strong>atorial requirements oftopology-transparent transmission schedules for channel access <strong>in</strong> mobilead hoc networks. We formulate the problem as a comb<strong>in</strong>atorial questionand observe that its solution is a cover-free family. The mathematicalproperties of certa<strong>in</strong> cover-free families have been studied extensively. Indeed,we show that both exist<strong>in</strong>g constructions for topology-transparentschedules (which correspond to orthogonal arrays) give a cover-free family.However, a specific type of cover-free family – called a Ste<strong>in</strong>er system– supports the largest number of nodes for a given frame length. We thenexplore the m<strong>in</strong>imum and expected throughput for Ste<strong>in</strong>er systems ofsmall strength, first us<strong>in</strong>g the acknowledgement scheme proposed earlierand then us<strong>in</strong>g a more realistic model of acknowledgements. We contrastthese results with the results for comparable orthogonal arrays, <strong>in</strong>dicat<strong>in</strong>gsome important trade-offs for topology-transparent access controlprotocols.1 IntroductionIn any network based on a shared broadcast channel, the means <strong>by</strong> which accessto the channel is controlled has a fundamental impact on the overall networkperformance. While these networks <strong>in</strong>clude satellites and local area networks,our <strong>in</strong>terest is <strong>in</strong> mobile ad hoc networks (MANETs). A MANET is a collectionof mobile wireless nodes. What dist<strong>in</strong>guishes a MANET from other wirelessnetworks is that it self-organizes without the aid of any centralized control or anyfixed <strong>in</strong>frastructure. S<strong>in</strong>ce the radio transmission range of each node is limited,it may be necessary to forward over multiple hops <strong>in</strong> order for a packet to reachits dest<strong>in</strong>ation (as such, MANETs have also been called multi-hop and packetradionetworks). This also offers the opportunity for concurrent transmissionswhen nodes are sufficiently separated. The challenge <strong>in</strong> medium access control(MAC) protocols for MANETs is to f<strong>in</strong>d a satisfactory trade-off between the twoobjectives of m<strong>in</strong>imiz<strong>in</strong>g delay and maximiz<strong>in</strong>g throughput.Of the myriad of access control techniques, our focus is on topology- transparentapproaches. Unlike topology-dependent protocols, which recompute accesswhenever the network topology changes, a topology-transparent protocol acts <strong>in</strong>dependentlyof topology change. One class of protocols which may be viewed as⋆ This work was supported <strong>in</strong> part <strong>by</strong> ARO grant DAAD 19-01-1-0406.⋆⋆ This work was supported <strong>in</strong> part <strong>by</strong> NSF grant ANI-0105985.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 247–258, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!