1

Cross-Layer Routing and Rate Control Strategies for Datagram-based Wireless Multi-Hop CSMA/CA Networks Ju-Lan Hsu and Izhak Rubin

Abstract—We investigate multi-hop wireless ad hoc networks in which nodes use software controlled radios and 802.11-based CSMA/CA MAC. Each node independently selects its cross-layer parameter vector for each packet that it forwards. The latter consists of the setting of the transmission data rate and the identification of the neighboring node to which the packet is forwarded (and thus the selection of the route). We present an analytical model to calculate, for each candidate parameter vector, the corresponding attainable throughput and transport throughput capacity rates. To enable the network to transport traffic in a throughput-effective manner, we present cross-layer schemes under which each node configures its parameter vector by using the corresponding link transport capacity measure as a key metric. Depending upon whether certain neighborhood activity status data is collected, we present two such datagram-based cross-layer parameter vector selection schemes. We compare the throughput performance behavior attained through the use of these schemes, as well as with that exhibited by schemes that do not use the link transport capacity function as a metric. Our results confirm the precision of our analysis and demonstrate the distinct effectiveness demonstrated by schemes that employ the link transport capacity measure.

I. INTRODUCTION Multi-hop wireless ad hoc networks have been widely studied over the past several years. While multi-rate operations have been commonly considered, the impact of such operations on the throughput efficiency of the network is largely unexplored. In this paper, we investigate key cross-layer issues involving combined adaptations across the physical, link, and network layers. While transmissions at a higher data rate lead to shorter packet transmission times and thus may potentially induce a higher throughput, they require a higher acceptable SINR (Signal to Interference and Noise Ratio). This may lead to the use of shorter link layer communication forwarding ranges. From network layer point of view, a flow may then have to be transported along a route that contains a larger number of hops. This thus produces higher network internal traffic loads, which may in turn increase the interference power measured at the receiving nodes. Hence, by increasing the data rate, one does not necessarily secure an upgrade in the end-to-end throughput performance behavior. We proceed in the following manner. We consider first the operations involving a single network station. We assume this tagged station to monitor certain key statistics that represent the activity of its neighborhood channel. Using such statistical data, The authors are with the Electrical Engineering Dept., University of California, Los Angeles (UCLA), USA. Email: {jlhsu, rubin}@ee.ucla.edu.

we characterize the performance behavior experienced by packets and flows traversing this node and its attached links. When designing distributed mechanisms for the selection of the parameter vector, we first examine the Independent Scheme, in which each node acts independently, based on its monitored status indicators, without coordinating with other nodes. We then develop a second scheme under which each node computes the parameter vector under the assumption that a fair occupancy of the channel takes place, instead of using monitored network activity statistics. It is identified as the Homogeneous Scheme. Our results demonstrate that the Homogeneous Scheme yields highly enhanced network performance. Since it is distributed, involving calculations that can be carried out in realtime, we conclude it to provide the efficient setting of the parameter vector investigated in this paper. To upgrade the performance behavior produced by shortest path routing protocols in wireless ad hoc networks, alternative routing metrics have been studied [11]. Recently, routing metrics have been proposed for use in multi-rate wireless networks [3][4][7][8][12]. We have also noted published papers that utilize optimization techniques for the selection of the cross-layer parameters [8][infocom08]. The network transport throughput capacity achievable by an ad hoc wireless network is noted in [1] to grow at an order of O(n1/2) bit-meters per second. The work in [7] has investigated the impact of variable transmission range levels realized under the use of variable data rates have been studied, assuming a static interference process. In contrast, in our study, we examine the performance of the network when the interference processes may stochastically and dynamically fluctuate. Accordingly, we develop cross-layer algorithms that employ system state monitors for current selection of the best parameter vector. In [12], the impacts of multiple transmission rates, interference and candidate selection have been studied in the context of opportunistic routing. An Expected Advancement Rate (EAR) metric has been presented. However, they do not consider the use of 802.11 CSMA/CA MAC. To the best of our knowledge, there are no published works that provide comprehensive mathematical based approaches for adaptive rate control and routing for ad hoc networks that employ 802.11 based MAC protocols. The organization of this paper is as follows. In section II, we present the nodal-centric model and characterize the system performance measures. In section III, we present and examine the performance of the two schemes for the setting of the parameter vector. Simulation evaluations are presented in IV and conclusions are drawn in V.

2 II. NODAL PERFORMANCE BEHAVIOR CHARACTERIZATIONS Consider a wireless multi-hop network carrying multiple end-to-end data packet flows. In this section, we focus on one tagged station and mathematically model its performance behavior as flows traverse this station through its attached links, under given, or monitored, network activity conditions. A. Performance Measure For a given flow whose packets are distributed across a selected path, to express the potential utility gained by flow packets when transmitted across a selected link using a selected data rate, it is advantageous to use the link transport throughput capacity as a performance measure. To calculate this metric, we assume, for the sake of the computation, that this flow is currently the only one using the link resources. This metric is then calculated as the product of the computed throughput capacity of the link and the projection of the forwarding range across the line vector connecting the source towards the destination. Under this definition, the same link may provide different link transport capacity levels when calculated with respect to different flows. In this paper, to implement and evaluate a simple mechanism, we consider here each node to implement datagram based mechanisms. Clearly, the calculations and algorithms presented here can be further enhanced by the inclusion of flow oriented end-to-end QoS performance considerations. B. System Model The nodal transmission power P is fixed at every station. Half-duplex radios are assumed to be used. Nodes are spatially Poisson distributed. In general, for a prescribed modulation coding scheme (MCS) that operates at a data rate rc, we can describe, 1) the relation between rc and the required minimum SINR threshold γ(rc) at the intended receiver, and 2), the relation between rc and the packet transmission time duration T(rc), rc∈Rc. Rc denotes the set of data rates offered by the available MCS structures. We consider a power law path loss model. Thus, the corresponding (i, j) link’s channel gain function is set as: Gij =dij-α, where dij is the physical distance between nodes i and j and α is the attenuation factor, α>2. Assume packets to contain a payload whose average length is equal to b bits. We consider a system that employs 802.11 DCF (Distribution Coordination Function) CSMA/CA type MAC. We assume that the use of RTS/CTS dialog is not invoked. We use CWj to denote the contention window size in the j-th backoff stage. The minimum and maximum window sizes are represented by CWmin=CW0 and CWmax=2mCWmin respectively, where m is an integer. After CWmax is reached, the window size is fixed. The retransmission limit is set equal to L, L≥m. Note that the carrier sense range (CS) is assumed to be fixed and not a function of the data rate. Alternatively, one may adapt the value assumed for the carrier sensing range for each data rate [10]. C. Characterizing the MAC Operations of a Tagged Station Station i observes the channel state of the wireless medium in its carrier sensing area. Denote the number of stations

(including itself) that currently contend for channel access, and that reside in the considered carrier sensing area, by K. For our analytical derivation, the following two-level (combined collision-SINR based) interference model is used to determine successful packet reception events. A packet transmission made by station i to station j is successful iff: 1) none of the other K-1 stations initiates a packet transmission at the same slot as that selected by station i; and 2) the SINR level at receiver j is higher than a threshold γ(rc), where rc is the data rate employed to transmit this packet. In this manner, we employ a collision model to account for interferences originated (by nodes residing) inside the carrier sensing area, and a SINR model to account for interferences originated outside the latter area. In the following, we carry out analysis to quantitatively describe station i's behavior. We introduce a model that characterizes the underlying system activity in terms of the following parameters: 1) The probability p0 that any of the other (K-1) stations starts to transmit at a given slot that belongs to the backoff period of station i. 2) The average channel occupancy time E[To], which represents the time duration during which the medium is sensed busy and thus made unavailable to station i, once any of the K-1 other stations start to transmit its packet. 3) A probability distribution function of the cumulative interference power level ID, originated by nodes residing outside node i's carrier sense region, measured at receiver j. In practice, node i can obtain these parameters by monitoring its observed network activity states and by receiving data from other nodes concerning activities in the neighborhood. Good estimates for the first two are readily derived from direct state observations by station i. Alternatively, the third parameter can be approximated by combining direct activity measures with assumptions of uniformity in the statistical behavior of nearby nodes. Such an approach is used in II-D. Given that node i has selected a specific slot for the transmission of its packet, we set 1- p to denote the probability that this packet is received successfully by its intended link layer receiver j and that its ACK is received successfully by node i. We set PcaptureD to denote the conditional probability of the successful reception of this packet under the impact of the cumulative interference at receiver j (originated outside node i’s carrier sensing zone). Given a successful data transmission, we set PcaptureA to denote the conditional probability of a successful ACK reception under the impact of the cumulative interference detected at node i. We use ID and IA to denote the power levels interfering with the reception of the data and ACK packets, respectively, as detected at their corresponding intended receivers. Hence, we obtain the following: (1) p = 1 − Pcapture D ⋅ Pcapture A ⋅ (1 − p0 ) , Pcapture D = P{I D ≤ Pd −α / γ (rc ) − N } , A

A

Pcapture = {I ≤ Pd

−α

/ γ (rc ) − N } ,

(2) (3)

where forwarding range d represents the distance across the link connecting station i to station j, and N represents the thermal noise power level. In Eqs. (1)-(3), PcaptureD and PcaptureA denote the probabilities that the SINR at the receivers of nodes i and j,

3 respectively, involving the respective receptions of the data and ACK packets, are larger than or equal to the threshold γ. In computing the head-of-line delay (THOL), also identified as the medium access delay [9], included are the time durations during which 1) station i backs off, 2) the channel is busy and the backoff process is frozen and 3) station i acquires the medium for transmitting its packet. E[THOL] is given by CWi − 1   L E[THOL ] = (Te ⋅ (1 − p0 ) + E[To ] ⋅ p0 ) ⋅  ∑ p i ⋅ (4) 2   i =0  L i + E[Tb ] ⋅  ∑ p  , with E[Tb ] = pTc + (1 − p)Ts ,  i=0  and Te, Tb, Ts and Tc are respectively the slot time, node i's channel occupancy time for a packet transmission, the mean time of a successful transmission and the mean time duration consumed by an unsuccessful transmission. Ts and Tc are further expressed in terms of SIFS, DIFS and ACK durations. The throughput capacity attained across the communications link (i, j), denoted as CS, is calculated by dividing the payload data length by the mean head-of-line delay incurred by a packet transmitted across this link, accounting only for successful transmissions. Its expression is thus given by Eq. (5). Noting the dependence of E[THOL] and p on the following parameters through Eqs. (1)-(4), we further express CS in terms of the number of stations residing within node i's CS region (K), the forwarding range d of (i, j) link, and the employed data rate rc, denoted as CS = CS(K,d,rc). b (5) CS = CS ( K , d , rc ) = ⋅ (1 − p L +1 ) . E[THOL ] The transport capacity attained across the identified link, such as the (i,j) link, assuming prescribed parameters (K,d,rc), with respect to a given flow, is defined as the product of the throughput capacity across the link multiplied by the averaged value of the link’s range when projected in the direction of the line vector connecting the flow’s source with the final destination, yielding: (6) CSt = CSt ( K , d , rC ) = CS (k , d , rC ) ⋅ d ⋅ cos(θ ) , where d·cos(θ) expresses the described projection. D. Characterizing the Cumulative Interference Process Recall the parameters that need to be monitored to enable the calculations introduced earlier in this Section. Often, it is costly to implement a mechanism that serves to monitor the cumulative interference power at a node. Hence, we also present here an approach under which the interference power at a node is computationally estimated rather than being measured. The evaluation results (omitted due to space limitation) show that our method provides accurate predictions of the performance behavior. Specifically, the cumulative power level (ID) induced by random interference signals sensed at tagged node i's link receiver j is expressed as the sum of two components, identified by the random variables IinD and IoutD. IinD denotes the interference level originated by nodes located outside station i's CS area but inside a disk area centered at node j, with a radius equal to the carrier sensing distance CS plus the forwarding range d between nodes i and j. The latter area is denoted by Ain

Fig. 1. Illustration of a transmission from node i to node j.

(see Fig. 1). In turn, the second component, IoutD, represents the interference power level originated by nodes located outside both the CS area of station i and the Ain region. This method is motivated by the work in [6]. The results there identify the dominating contribution made by the most significant interferers and the imprecision of a pure Gaussian approximation of the cumulative interference. We thus use the Gaussian approximation for calculating the IoutD component and IA. For calculating the IinD component, we use the following approximation. Noting that the probability that two nodes residing in Ain simultaneously initiate a transmission at the same slot is quite low, we assume that at most one interfering node can be active in Ain. We then characterize the probability of an active transmission in Ain, induced by the Poisson nodal spatial locations and the prescribed channel access intensity. Given there is an interfering transmission in Ain, we further notice that the interfering node’s location is uniformly distributed. The details are omitted here due to space limitation. III. DESIGNING MECHANISMS FOR CROSS-LAYER JOINT ROUTING AND RATE CONTROL

A. Parameter Vector Selection Mechanisms We aim to design a distributed mechanism for selecting the parameter vector at each node. We assume the network system to be highly loaded and thus saturated with traffic, so that we aim to devise a cross-layer operation that yields upgraded network throughput capacity. For implementation simplicity, we consider the following relatively simple distributed mechanisms. We note that the algorithms used here require each node to forward its packets to a neighboring node that provides positive progress towards the destination. For each packet that a node receives and forwards, it considers all of its neighboring nodes (when operating at the lowest data rate). The corresponding parameter vector that is used to forward the packet is then determined in accordance with one of the following candidate schemes. Scheme 1 - Independent Transport-Based Scheme: The forwarding node continuously monitors and calculates channel activity statistics (updates of p0 and E[To]). Using these statistics, the node computes for each of its neighbors and selects the parameter vector that yields the highest link transport capacity level. The computations follow directly by using the formulas presented in II. Scheme 2 - Homogeneous Transport-Based Scheme: For each neighbor, the forwarding station computes the parameter

4

vector that yields the highest link transport throughput capacity level. For this computation, rather then using monitored channel statistics, it proceeds by assuming all other nodes to be statistically operating under the same conditions that characterize its own behavior, even when this may not be the case. Such an assumption is motivated by access fairness behavior imposed by the CSMA/CA MAC when the nodal region operates in a highly loaded (or saturated) mode. Scheme 3 - Max Progress Scheme: The forwarding station selects the node that provides the highest (positive) progress range towards the destination node. In communicating with the selected node, it employs a data rate that is equal to the highest feasible such rate that enables the forwarding of the packet. This scheme thus aims to forward packets along shorter routes. Scheme 4 - Max Transmit Rate Scheme: The forwarding node strives to select the highest data rate that enables it to forward a packet to a neighboring node yielding positive progress. If multiple neighbors can be reached at this rate, the one that yields the highest progress range is selected. Scheme 5 - Nearest neighbor scheme: For each neighbor, the forwarding node selects the closest node that yields positive progress towards the destination. It then uses the highest data rate that enables it to forward the packet to the selected node. The computation of the parameter vector carried out by each node in accordance with Scheme 2 is presented in the remainder of this Section. The corresponding computations carried out by Schemes 3-5 are straightforward. The latter provide benchmark comparisons to Schemes 1-2. They do not base the selection of the parameter vector on the computation of a transport throughput capacity measure, as employed by Schemes 1-2. B. Parameter Vector Selection under Homogeneous Scheme For a station that is contending for access with K-1 other stations that are located in its carrier sense area, recalling our assumption that the system’s offered traffic load is sufficiently high so that it is driven to saturation state. Since, for calculating the parameter vector, each station assumes other stations to act in a homogeneous fashion (i.e., to statistically exhibit behavior similar to its own), the corresponding p0 and E[To] are expressed as follows: (7) p0 = 1 − (1 − τ ) K −1 , E[To ] = E[Tb ] . We employ the two-dimensional Markov chain model developed in [5] to characterize the backoff process. The detailed derivations are omitted, and the result is given below: −1

L +1  L CWl − 1 l  1 − p . (8) p 2   1− p Using the latter results, we solve the system of equations given by Eqs. (1)-(3)(7)(8) through numerical computations. Noting from Eq. (8) that τ is non-increasing function of p, and, from Eqs. (1)-(3)(7), that p is non-decreasing function of τ, we conclude that a unique fixed point is guaranteed to exist [13]. To obtain K (in Eq. (7)), we assume active nodal locations

τ = ∑ l =0

2 link transport capacity (bps*m/m )

3.5

x 10

4

6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps

3 2.5 2 1.5 1 0.5 0 5

10

15 20 25 forwarding range (m)

30

35

Fig. 2. Link transport capacity versus forwarding range performance results for selected values of rc when CS = 50 m.

over the area of operations to be two-dimensional Poisson spatial distribution with parameter υ. Recall that Eq.(5) expresses the link throughput capacity Cs ( K , d , rc ) and is a function of the number of nodes K, forwarding distance d, and data rate rc. We use Cs to express the link throughput capacity rate attained along such a link (link distance is d) by averaging over the values assumed by K according to the underlying spatial Poisson nodal distribution assumption. In a similar manner, we use CSt = CSt (d , rc ) to express the link transport capacity rate averaging over the values assumed by K, with respect to a given flow direction. Note that the directional penalty factor (expressed by the cosine term) depends on the relative nodal spatial layout. Its realized value is effectively independent of the configured parameter vector. For illustration purposes, we thus do not include this cosine factor in the figure. We consider the underlying multi-MCS implementation provided by IEEE 802.11a. The data rate and the corresponding required SINR levels for successful reception, per MCS, are given in Table 1 for a targeted BER value of 10-5 ([2]). The transmission power is fixed at 0.01 mW and the background noise power level is assumed to be equal to 10-9 mW. The effective communications ranges for the set of modulation coding schemes under consideration are given as: 39.8, 36.0, 33.4, 30.2, 21.1, 19.1, 14.1 and 13.7 meters. In Fig. 2, the link transport capacity level is plotted against the forwarding range, under selected data rate levels, when the CS distance is set equal to 50 m. Corresponding to each data rate value, there exists a unique optimal forwarding range level. The latter is the longest forwarding range that enables the signal to be received at a sufficiently high SINR level. We note that the link transport capacity performance becomes a more sensitive function of the forwarding range at higher data rate levels. As one acts to dynamically adapt the parameter vector to actual locations of nodes (so that a node must select a neighbor from those nodes that currently reside in its vicinity), only a subset of parameter vectors are under consideration. When considering the availability of neighboring nodes at any selected range, we note from Fig. 4, that the optimal link transport capacity level is achieved by employing a data rate that is equal to 36 Mbps. We also observe that the relative optimality of the parameter vector selection is quite insensitive to the underlying nodal spatial density (curves not shown here due to space limitation). Recall again that the results presented in this section, depicting the expected behavior of the link transport capacity

5 function are used as metrics employed in the selection of the parameter vector, when employing the Homogeneous Scheme. IV. SIMULATION PERFORMANCE RESULTS AND COMPARISONS OF PARAMETER VECTOR SELECTION ALGORITHMS

We have used a discrete event based C++ simulator to conduct various evaluations. Our evaluation is aimed to investigate the usefulness of our analysis results in realistic scenarios where multiple traffic flows traverse the network. Assuming each node to learn the location of its neighbors and the direction towards destination nodes, each node proceeds to independently compute its parameter vector. We let the 5 schemes introduced in III to be used independently by network nodes to compute the parameter vector to forward traversing packets across multihop routes to their destinations. We randomly place 120 nodes in a 150m x 150m area of operation and randomly set the network to be loaded by 4 source-destination flows. We note that at the lowest data rate a path that covers a distance of 150 m will use about 4 hops; at the highest data rate, such a path will employ 12 hops. We configure the loading level to be sufficiently high to lead to a saturated operation. For the effective communication range calculations carried out by the protocols employed by Schemes 3 - 5, we have considered a model that assumes the total noise plus interference power at the receiver to be equal to 1) the noise power (N) or 2) noise plus a 3 dB margin. Twenty distinct spatial topology realizations were generated and used to evaluate the performance of the 5 schemes. The resulting aggregate (over all end-to-end flows) throughput performances are shown in Table 2. It is observed that Scheme 2 outperforms every other mechanism for 12 out of the 20 experiments, while Scheme 1 does so for 6 experiments. For 90% of the experiment cases, Schemes 1–2 together provide the best performance levels. Schemes 3 and 4 display top performance each for a single case. Scheme 5 displays poor performance behavior for all simulated cases (not shown in Table 2). As we further increase the assumed supplemental interference power, we have noticed (not shown here) the throughput performance level to further degrade. The results thus clearly point out the performance superiority exhibited by Scheme 2 in the selection Table 2. Aggregate end-to-end throughput performance under selected forwarding algorithms (Colored entries represent best performance levels among the simulations tested with the same seed) Scheme exp. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

1 1.7872 5.5064 0.8528 16.1208 5.3288 4.9192 4.4536 9.3368 3.0872 5.4 3.9304 0.8696 2.796 9.3192 7.252 9.0696 1.4184 4.2688 4.5872 17.7544

Aggregate throughput (Mbps) 3 2 0dB 3dB 2.1288 0.4424 1.8296 8.148 3.1952 5.3672 1.1608 0.3256 0.9048 14.4896 14.7976 13.384 6.0144 2.1056 3.3368 5.748 3.352 5.3536 4.684 2.257 2.2272 11.612 10.252 12.1336 3.0368 0.8456 1.9488 6.5048 0.044 3.3032 3.1312 3.6888 1.592 3.3304 0.336 0.6408 5.1496 5.2408 4.6616 12.4752 9.9432 7.1712 6.5304 0.932 5.9008 9.884 2.2448 7.4744 1.1616 0.2264 0.7976 5.4648 1.836 2.5744 8.1312 3.6352 6.8464 15.6232 8.7984 13.8976

4 0dB 0.044 2.4096 0.0176 13.8824 2.568 4.2064 0.0296 3.4872 0.0216 0.5032 0.7368 0.0224 6.828 8.2944 0.3896 5.9896 0.0032 1.4976 5.0376 9.1312

3dB 0.784 5.7776 1.0744 12.1592 4.2335 4.7584 1.748 10.5944 0.9704 3.668 3.7016 0.4256 6.0856 9.9432 4.5624 6.6336 0.3648 2.7008 6.12 10.1

of the parameter vector. We also notice that the performance levels attained under Scheme 2 reach the 80th percentile level of the highest displayed level of all schemes for 95% of the time. Using these results, we conclude that the effectiveness of Scheme 2 has been well demonstrated under heterogeneous traffic patterns and a multitude of heterogeneous spatial and temporal conditions. V. CONCLUSION We consider the settings of the cross layer operational parameters for software defined radio modules in multi-hop wireless networks. To measure the ability of the network to transport traffic flows in a throughput effective manner, we employ the link transport capacity measure as a key performance metric. Each node jointly selects, for each packet, the corresponding parameter vector that involves the preferred data rate and forwarding link across the selected route. We develop an analytical model that examines the detailed operation when CSMA/CA MAC is employed. We evaluate the cross-layer effectiveness of two distributed datagram-based cross layer schemes. We show the use of the link transport capacity metric as a basis for the setting of the cross layer parameter vector to yield significantly enhanced performance. REFERENCES [1] [2]

[3] [4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

P. Gupta and P. R. Kumar, “The Capacity of Wireless Networks,” IEEE Trans. on Information Theory, Vol. 46, No. 2, March 2000. J. Yee and H. Pezeshki-Esfahani, “Understanding Wireless LAN PerformanceTrade-Offs,”www.commsdesign.com/csdmag/sections/feat ure_article/showArtcle.jhtml?articleID=16505827 R. Draves, J. Padhye, and B. Zill, “Routing in multi-radio, multi-hop wireless mesh networks,” in Proc. ACM Mobicom, September 2004. B. Awerbuch, D. Holmer, and H. Rubens, “The medium time metric: High throughput route selection in multi-rate ad hoc wireless networks,” Kluwer Mobile Networks and Applications (MONET) Journal Special Issue on ”Internet Wireless Access: 802.11 and Beyond”. Bianchi, G., "Performance Analysis of the IEEE 802.11 Distributed Coordination Function", IEEE J-SAC Vol. 18 N. 3, Mar. 2000, pp. 535-547. Koskinen, H. and Virtamo, “Probability of successful transmission in a random slotted-aloha wireless multihop network employing constant transmission power,” In Proc. MSWiM '05. H. Zhai and Y. Fang, ''Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks,'' in Proc. of The IEEE International Conference on Computer Communications (INFOCOM'06), Barcelona, Spain, April 23-29, 2006 H. Zhai and Y. Fang, ''Impact of Routing Metrics on Path Capacity in Multi-rate and Multi-hop Wireless Ad Hoc Networks,'' in Proc. ICNP'06, 2006. Taka Sakurai, Hai L. Vu, "MAC Access Delay of IEEE 802.11 DCF", IEEE Transactions on Wireless Communications, vol. 6, no. 5, May 2007. Zhu, J., Guo, X., Lily Yang, L., Steven Conner, W., Roy, S., and Hazra, M. M., “Adapting physical carrier sensing to maximize spatial reuse in 802.11 mesh networks,” Wirel. Commun. Mob. Comput. 4, 8, Dec. 2004. D. Decouto, D. Aguayo, J. Bicket, and R. Morris, "A high-throughput path metric for multi-hop wireless networks", in Proceedings of MobiCom, 2003. Kai Zeng, Wenjing Lou, Hongqiang Zhai, “On End-to-end Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks,” in Proceedings of IEEE INFOCOM 2008. Anurag Kumar, Eitan Altman, Daniele Miorandi and Munish Goyal ``New Insights from a Fixed Point Analysis of Single Cell IEEE 802.11 WLANs,'' IEEE Transactions on Networking, to appear.

Cross-Layer Routing and Rate Control Strategies for ...

Los Angeles (UCLA), USA. Email: {jlhsu, rubin}@ee.ucla.edu. we characterize the performance behavior experienced by packets and flows traversing this node ...

125KB Sizes 2 Downloads 299 Views

Recommend Documents

On Routing and Rate Control Strategies in Wireless ...
that advanced physical layer technologies enabling higher transmission data rates be ..... For illustration purposes, we use the information theoretic. (Shannon's) ...

Cross-Layer Multi-Rate Routing Strategies in Wireless ...
To enhance the throughput performance of such networks, it is of prime interest to adapt ... A high data rate transmission may require a higher level of acceptable ...

improved rate control and motion estimation for h.264 ... - CiteSeerX
speed in designing the encoder. The encoder developed by the Joint ..... [3] “x264,” http://developers.videolan.org/x264.html. [4] “MPEG-4 AVC/H.264 video ...

Quality of Service Routing and Admission Control for ...
1. Quality of Service Routing and Admission Control for Mobile. Ad-hoc Networks with a Contention-based MAC Layer. L. Hanzo (II.) and R. Tafazolli. Centre for ...

Crosslayer Design for Distributed MAC and Network ...
Abstract—In this paper, we address the joint design and distributed implementation of medium access control (MAC) and network coding in wireless ad hoc ...

Flexible Optical Metrology Strategies for the Control and Quality ...
quality assurance strategy that is nowadays used for mass production is unable to cope with the inspection flexibility needed among automated small series ... requirements of small series production and presents flexible metrology strategies based on

Adaptive Rate Control for Streaming Stored Fine ...
are thus suitable for servers that stream a large number of simultaneous ... of our heuristic when run on top of TCP to when run on top of popular ...... t = mC t = tmax end. ∆k+2 = ∆(tmax end ) = Figure 3: Optimal state graph G. 0. 50. 100. 150.

Jointly optimized bit-rate/delay control policy for ...
Wireless Packet Networks With Fading Channels. Javad Razavilar ... K. J. R. Liu and S. I. Marcus are with the Electrical and Computer Engineering. Department and Institute ...... B.S. degree from the National Taiwan University,. Taiwan, R.O.C. ...

Proto-Object Based Rate Control for JPEG2000: An ... - IEEE Xplore
Abstract—The JPEG2000 system provides scalability with respect to quality, resolution and color component in the transfer of images. However, scalability with ...

Global Rate Control Scheme for MPEG-2 HDTV ...
This paper proposes a new rate control scheme for an. MPEG-2 HDTV parallel encoding system consisting of mul- tiple encoding units. In this rate control scheme, the tar- get number of bits is allocated to each encoding unit every frame period using t

Proto-Object Based Rate Control for JPEG2000: An ... - IEEE Xplore
Constraints inherent in a modern visual data transmission system, such as heterogeneous network, varying connection quality, or the need to operate on a variety of devices with a wide range of capabilities, motivate an intense worldwide research effo

Modified AODV Routing Protocol for Traffic Control in ...
using adaptive routing with congestion control technique for mobile ad hoc networks. .... Energy Management: Energy management is defined as the process of ...

A New Rate-Quantization Model for H.264/AVC Low-Delay Rate Control
A New Rate-Quantization Model for. H.264/AVC Low-Delay Rate Control. Junhui Hou1,2, Shuai Wan2, Zhan Ma3, Fuzheng Yang4, and Lap-Pui Chau1. 1School of Electrical and Electronics Engineering, Nanyang Technological University,. 639798 Singapore. 2Schoo

Rate-Dependent Hysteresis Modeling and Control of a ... - IEEE Xplore
a Piezostage Using Online Support Vector Machine and Relevance .... model and suppress the rate-dependent hysteretic behavior of a piezostage system, and ...

120502 A Comparison of Rate Control and Rhythm ...
Dec 5, 2002 - study to compare the long-term effects of rate control with those of rhythm control, ..... sinus rhythm.3,17 Our data strongly support this no- tion. The study .... 1. Wellens HJJ. Atrial fibrillation — the last big hurdle in treating

Revisiting Routing Control Platforms with the Eyes and ...
Aug 13, 2012 - modification of current routing2 services by users and oper- ators without the ... culation on a per client or group of clients basis [17, 25]. Today, AT&T .... In line with the best design practices of cloud applica- tions, we rely on

mobile backbone network routing with flow control and ...
into the network so that the Quality-of-Service of admitted flows could be ..... values between 7 and 9 hops yield the best delay-throughput performance behavior. .... on Broadband Networks (BroadNets), page 661-670, Oct. 2004. Authorized ...

Bacterial Risk Control Strategies for Blood Collection ...
3 Currently, storage systems that ensure platelet efficacy through 7 days of storage of platelets treated by PRT are not available. ..... for pre-storage pooled platelets until such technologies are cleared for use in this ...... irradiation system (

Bacterial Risk Control Strategies for Blood Collection ... - FDA
apheresis platelets, that inoculating a total of 16 mL volume, at 36 to 48 hours ... Under 21 CFR 610.53(c), the dating period for platelets is either 72 hours from ...

Patient-Cooperative Control Strategies for Coordinated ...
support the subject in a patient-cooperative way during the training is introduced. .... In order to define support, an ideal reference trajec- tory is needed.

Patient-Cooperative Control Strategies for Coordinated ...
to use admittance control, a force/torque sensor is needed. Since there are ... filter are the velocities ˙qc in the joint space. The velocities ˙q in the joint space are subtracted from the reference velocities. jZr. -1. J. jD. jYc. Force/ Torque.

Flexible Optical Metrology Strategies for the Control ...
Jun 14, 2009 - In many cases, SSP focuses on the manufacturing of a big product variety in a short period ... Sensor data fusion: combination of data from.

investigation-of-plant-control-strategies-for-a-supercritical-co2 ...
... much during load following. Page 3 of 8. investigation-of-plant-control-strategies-for-a-supercri ... ooled-fast-reactor-using-the-anl-plant-dynamics-code.pdf.

Bacterial Risk Control Strategies for Blood Collection ... - FDA
and Development (OCOD), 10903 New Hampshire Ave., Bldg. 71, Rm. 3128, Silver Spring, ... Use of Pathogen Reduction Technology of Platelets .