Robust STDMA Scheduling in Multi-hop Wireless Networks for single-node position perturbations

被引:1
作者
Somarriba, Oscar [1 ]
Zander, Jens [1 ]
机构
[1] Royal Inst Technol KTH, Dept Commun Syst, Radio Commun Syst, Stockholm, Sweden
来源
2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS | 2009年
关键词
multihop; spatial TDMA; robust STDMA; power control; rate adaption; TDMA;
D O I
10.1109/PIMRC.2009.5450021
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A major design issue in Multi-hop Wireless Networks is the Medium Access Control (MAC) protocols that determine how nodes share the channel to transmit their packets. One type of MAC protocol with efficient spatial reuse characteristics are the Spatial TDMA (STDMA) protocols. STDMA protocols are a class of conflict-free MAC protocols that enable high spectral utilization by scheduling transmissions on the channel. Its main features are high throughput and the possibility of providing delay guarantees. We studied the sensibility of STDMA networks to disruption caused by slow mobility of one "critical" node (single-user perturbation), that causes problems to the schedule maintenance. We assessed a framework that produces robust STDMA scheduling against these topological changes. To do that, we introduced and analyzed heuristic algorithms that mainly exploit capabilities of the physical layer such as power and rate control, and rerouting. We considered the limited-mobility management in STDMA networks to find the ranges where our heuristics will avoid re-scheduling of the whole STDMA frame. We found that a substantial throughput degradation due to slow mobility in STDMA networks can be compensated by means of power or rate control, and rerouting. Our results showed that rate-controlled (RC) STDMA is the most promising scheme to maintain communication under slow mobility.
引用
收藏
页码:566 / 571
页数:6
相关论文
共 50 条
  • [41] Spatial Correlation Based Clustering with Node Energy Based Multi-Hop Routing Scheme for Wireless Sensor Networks
    Sreedharan, Panchikattil Susheelkumar
    Pete, Dnyandeo Jageshwar
    TEHNICKI GLASNIK-TECHNICAL JOURNAL, 2021, 15 (01): : 25 - 36
  • [42] Association Graph based Jamming Detection in Multi-Hop Wireless Networks
    Wei, Xianglin
    Hu, Fei
    Sun, Qin
    Wang, Tongxiang
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 397 - 402
  • [43] Multi-Hop Cognitive Wireless Powered Networks: Outage Analysis and Optimization
    Xu, Chi
    Xia, Changqing
    Song, Chunhe
    Zeng, Peng
    Yu, Haibin
    IEEE ACCESS, 2019, 7 : 4338 - 4347
  • [44] Cross Layer Design for Routing and Security in Multi-hop Wireless Networks
    Khan, Shafiullah
    Loo, Kok Keong
    Din, Zia Ud
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (03): : 170 - 173
  • [45] Utilizing Multi-Hop Neighbor Information in Spectrum Allocation for Wireless Networks
    Huang, Rongsheng
    Fang, Yuguang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (08) : 4360 - 4367
  • [46] Congestion-aware topology controls for wireless multi-hop networks
    Park, Seung-Jong
    Sivakumar, Raghupathy
    AD HOC NETWORKS, 2010, 8 (03) : 295 - 312
  • [47] Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels
    Liu, Zheng
    Ma, Maode
    Dai, Jufeng
    COMPUTER NETWORKS, 2012, 56 (09) : 2304 - 2315
  • [48] Performance of Multi-hop Networks Using Beacon and Non-beacon Scheduling in Wireless Sensor Network (WSN)
    Al Rasyid, M. Udin Harun
    Saputra, Ferry Astika
    Ismar, Mh. Ramdhani
    2015 International Electronics Symposium (IES), 2015, : 195 - 199
  • [49] On Throughput Guarantee of Aloha-Like Multi-Hop Wireless Networks
    Monchai Lertsutthiwong
    Thinh Nguyen
    Alan Fern
    Wireless Personal Communications, 2010, 53 : 53 - 66
  • [50] Evaluation of Interference in Inter-working Multi-hop Wireless Networks
    Salami, Oladayo
    Bagula, Antoine
    Chan, H. Anthony
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (04): : 17 - 31