The Community for Technology Leaders
RSS Icon
Issue No.04 - April (2012 vol.11)
pp: 679-691
Xin Wang , University of California, Santa Cruz
J.J. Garcia-Luna-Aceves , University of California, Santa Cruz
Hamid R. Sadjadpour , University of California, Santa Cruz
We proposed an analytical model to study the interplay between medium access control (MAC) and packet forwarding disciplines in multihop wireless networks. The model jointly considers the channel access procedure and the active portions of the topology, which is determined by packet forwarding discipline. The model allows the computation of per-node performance metrics for any given network topology and the combination of specific MAC protocols and packet forwarding methods. As an example of the applicability of our modeling framework, the analytical model is used to study the performance of multihop wireless networks using a contention-based MAC protocol (the IEEE 802.11 distributed coordination function) and a schedule-based MAC protocol (NAMA), together with different packet forwarding schemes in multihop networks. The analytical results derived from the model are validated with discrete-event simulations in Qualnet; the analytical results are shown to be very close to those attained by simulations.
Medium access control, contention-based MAC, schedule-based MAC, multipath, opportunistic forwarding.
Xin Wang, J.J. Garcia-Luna-Aceves, Hamid R. Sadjadpour, "Understanding the Interaction between Packet Forwarding and Channel Access in Multihop Wireless Networks", IEEE Transactions on Mobile Computing, vol.11, no. 4, pp. 679-691, April 2012, doi:10.1109/TMC.2011.90
[1] IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 802.15.4-2003.pdf, 2003.
[2] ZigBee Alliance, “ZigBee-2007 Specification,” Document 053474r17, http:/, Jan. 2008.
[3] M.A. Lopez-Gomez, A. Florez-Lara, J.M. Jimenez-Plaza, and J.C. Tejero-Calado, “Algorithms and Methods beyond the IEEE 802.15.4 Standard for a Wireless Home Network Design and Implementation,” Proc. IEEE Int'l Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 138-145, June 2008.
[4] A. Koubâa, A. Cunha, M. Alves, and E. Tovar, “TDBS: A Time Division Beacon Scheduling Mechanism for Zigbee Cluster-Tree Wireless Sensor Networks,” Real-Time Systems J., vol. 40, no. 3, pp. 321-354, Dec. 2008.
[5] V. Annamalai, S.K.S. Gupta, and L. Schwiebert, “On Tree-Based Convergecasting in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking (WCNC), pp. 1942-1947, Mar. 2003.
[6] M.-S. Pan and Y.-C. Tseng, “Quick Convergecast in ZigBee Beacon-Enabled Tree-Based Wireless Sensor Networks,” Computer Comm., vol. 31, pp. 999-1011, 2008.
[7] L.-W. Yeh and M.-S. Pan, “Two-Way Beacon Scheduling in ZigBee Tree-Based Wireless Sensor Networks,” Proc. IEEE Int'l Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 130-137, June 2008.
[8] X. Chen, X. Hu, and J. Zhu, “Minimum Data Aggregation Time Problem in Wireless Sensor Networks,” Proc. Int'l Conf. Mobile Ad-Hoc and Sensor Networks, X. Jia, J. Wu, and Y. He, eds., pp. 133-142, 2005.
[9] S. Upadhyayula, V. Annamalai, and S.K.S. Gupta, “A Low-Latency and Energy-Efficient Algorithm for Convergecast in Wireless Sensor Networks,” Proc. IEEE Global Telecomm. Conf. (GlobeCom), pp. 3525-3530, Dec. 2003.
[10] N.-L Lai, C.-T King, and C.-H Lin, “On Maximizing the Throughput of Convergecast in Wireless Sensor Networks,” Proc. Int'l Conf. Advances in Grid and Pervasive Computing, S. Wu, L. Yang, and T. Xu, eds., pp. 396-408, 2008.
[11] J. Zhu and X. Hu, “Improved Algorithm for Minimum Data Aggregation Time Problem in Wireless Sensor Networks,” J. Systems Science and Complexity, vol. 21, pp. 626-636, 2008.
[12] J. Mao, Z. Wu, and X. Wu, “A TDMA Scheduling Scheme for Many-to-One Communications in Wireless Sensor Networks,” Computer Comm., vol. 30, pp. 863-872, 2007.
[13] L.-H. Yen, Y.W. Law, and M. Palaniswami, “Risk-Aware Beacon Scheduling for Tree-Based ZigBee/IEEE 802.15.4 Wireless Networks,” Proc. Fourth Int'l Wireless Internet Conf. (WICON '08), 2008.
[14] I. Stojmenovic, A. Nayak, and J. Kuruvila, “Design Guidelines for Routing Protocols in Ad Hoc and Sensor Networks with a Realistic Physical Layer,” IEEE Trans. Comm., vol. 43, no. 3, pp. 101-106, Mar. 2005.
[15] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Ad Hoc Networks beyond Unit Disk Graphs,” Wireless Networks, pp. 715-729, 2008.
[16] G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic, “Models and Solutions for Radio Irregularity in Wireless Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 2, pp. 221-262, 2006.
[17] P. Hall, Introduction to the Theory of Coverage Processes. John Wiley and Sons, 1988.
[18] L.-H. Yen and Y.-M. Cheng, “Clustering Coefficient of Wireless Ad Hoc Networks and the Quantity of Hidden Terminals,” IEEE Comm. Letter, vol. 9, no. 3, pp. 234-236, Mar. 2005.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool