13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

248 C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gtopology-transparent is the contention based MAC protocols. Contention basedapproaches achieve high throughput with a reasonable expected delay but withpoor worst-case delay. With <strong>in</strong>creas<strong>in</strong>g <strong>in</strong>terest <strong>in</strong> multi-media applications, thedelay characteristics of contention based MAC protocols do not appear adequateto provide the necessary quality-of-service (QoS) support. While there have beensome efforts to make such protocols QoS-aware, <strong>in</strong> each case the delay guaranteerema<strong>in</strong>s probabilistic [1,12,14].TDMA is an example of a scheduled access control protocol that is triviallytopology-transparent. More sophisticated schemes for generat<strong>in</strong>g topologytransparenttransmission schedules [2,10] depend on two design parameters: N,the number of nodes <strong>in</strong> the network, and D, the maximum node degree. Thiscreates complex trade-offs between the design parameters and the delay andthroughput characteristics of the result<strong>in</strong>g schedules. For example, while it isoften possible to construct schedules that are significantly shorter than TDMA,if the actual node degree exceeds D, the delay guarantee is lost. More exactly,the delay becomes probabilistic rather than determ<strong>in</strong>istic. While the questionof what should be done if the protocol fails is important (see [3,16] for somealternatives), we will not address this problem here.In [16], we observed that exist<strong>in</strong>g topology-transparent transmission schedulesare <strong>in</strong>stances of orthogonal arrays, and we explored the consequences of thisobservation on throughput. In this paper we go one step further, look<strong>in</strong>g morecarefully at the comb<strong>in</strong>atorial requirements of topology-transparent transmissionschedules. This allows us to formulate the problem as a comb<strong>in</strong>atorial questionand observe that its solution is a cover-free family. Certa<strong>in</strong> cover-free familieshave been studied extensively, and rather than derive new mathematical results,we <strong>in</strong>stead show how to use exist<strong>in</strong>g results for our application. Our first observationshows that an orthogonal array gives a cover-free family. We then showthat a specific type of cover-free family, called a Ste<strong>in</strong>er system, supports thelargest number of nodes for a given frame length. We then explore the m<strong>in</strong>imumand expected throughput for Ste<strong>in</strong>er systems of small strength, first us<strong>in</strong>g theacknowledgement scheme proposed earlier and then us<strong>in</strong>g a more realistic modelfor acknowledgements. We contrast these results with the results for comparableorthogonal arrays, <strong>in</strong>dicat<strong>in</strong>g some important trade-offs for topology-transparentprotocols.The rest of this paper is organized as follows. Section 2 first exam<strong>in</strong>es thecomb<strong>in</strong>atorial requirements of a topology-transparent transmission schedule, andshows that a cover-free family satisfies the requirements. We also show howcover-free families relate both to orthogonal arrays, and to Ste<strong>in</strong>er systems. InSection 3, we study the selection of parameters of the Ste<strong>in</strong>er system depend<strong>in</strong>gon the performance objective of <strong>in</strong>terest. We consider both m<strong>in</strong>imum and expectedthroughput us<strong>in</strong>g an acknowledgment scheme proposed earlier. As well,we <strong>in</strong>troduce a more realistic acknowledgement model and study the result<strong>in</strong>gframe throughput. We produce our results as a function of neighbourhood sizeand density, to explore the sensitivity of the actual node degree to the designparameter. Lastly, <strong>in</strong> Section 4, we summarize and conclude.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!