13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ste<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs 257600–700 Node ThroughputExpected Throughput0.040.030.020.010 10 20 30 40Size of NeighbourhoodFig. 6. Expected throughput for Ste<strong>in</strong>er systems for 600-700 nodes.orthogonal arrays. This is significant for delay sensitive applications such asmulti-media. S<strong>in</strong>ce Ste<strong>in</strong>er systems are also more dense, they support more nodesfor a given frame length and hence achieve higher throughput. While shorterschedules give the best m<strong>in</strong>imum and expected throughput, they also degradefaster as the design parameter D is exceeded. That is, longer schedules are morerobust to changes <strong>in</strong> neighbourhood size. Another general observation is that theSte<strong>in</strong>er systems that yield longer schedules achieve higher ratios on m<strong>in</strong>imum andexpected throughput when compared to TDMA schedules of the same length.We have characterized the types of solutions topology-transparent transmissionschedules require as cover-free families. Us<strong>in</strong>g this, along with a more realisticacknowledgement model, we plan to <strong>in</strong>vestigate the issue of what to dowhen the schedule fails due to node mobility caus<strong>in</strong>g the design parameter onneighbourhood size to be exceeded. This, together with simulations us<strong>in</strong>g mobilitymodels are required to determ<strong>in</strong>e how such scheduled topology-transparentprotocols compare to contention based protocols.References1. M. Benveniste, G. Chesson, M. Hoeben, A. S<strong>in</strong>gla, H. Teunissen, and M. Went<strong>in</strong>k,Enhanced Distributed Coord<strong>in</strong>ation Function (EDCF) proposed draft text, IEEEwork<strong>in</strong>g document 802.11-01/131r1, March 2001.2. I. Chlamtac and A. Faragó, “Mak<strong>in</strong>g Transmission Schedules Immune to TopologyChanges <strong>in</strong> Multi-Hop Packet Radio Networks, IEEE/ACM Transactions onNetwork<strong>in</strong>g, Vol. 2, No. 1, February 1994, pp. 23–29.3. I. Chlamtac, A. Faragó, and H. Zhang, “Time-Spread Multiple-Access (TSMA)Protocols for Multihop Mobile Radio Networks,” IEEE/ACM Transactions on Network<strong>in</strong>g,Vol. 5, No. 6, December 1997, pp. 804–812.4. C.J. Colbourn and J.H. D<strong>in</strong>itz (eds.), The CRC Handbook of Comb<strong>in</strong>atorial Designs,c○1996 CRC Press, Inc.5. C.J. Colbourn, J.H. D<strong>in</strong>itz, and D.R. St<strong>in</strong>son, “Applications of Comb<strong>in</strong>atorial Designsto Communications, Cryptography, and Network<strong>in</strong>g,” <strong>in</strong> Surveys <strong>in</strong> Comb<strong>in</strong>atorics,1999, J.D. Lamb and D.A. Preece (eds.), London Mathematical Society,<strong>Lecture</strong> Note Series 267, c○Cambridge University Press, 1999, pp. 37–100.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!