• 沒有找到結果。

A Distributed Power Control MAC Protocol for Wireless Ad Hoc Networks¹

N/A
N/A
Protected

Academic year: 2022

Share "A Distributed Power Control MAC Protocol for Wireless Ad Hoc Networks¹"

Copied!
6
0
0

加載中.... (立即查看全文)

全文

(1)

A Distributed Power Control MAC Protocol for Wireless Ad Hoc Networks¹

*

Maciej Zawodniok and Sarangapani Jagannathan Department of Electrical and Computer Engineering,

University of Missouri-Rolla Rolla, Missouri 65401

mjzx9c@umr.edu, sarangap@umr.edu

Abstract—A novel distributed power control (DPC) scheme and a MAC protocol for wireless ad hoc networks in the presence of radio channel uncertainties such as path loss, Shadowing and Rayleigh fading is presented. The DPC quickly estimates the time-varying nature of the channel and uses the information to select a suitable transmitter power value in order to maintain a target Signal-to-Interference ratio (SIR) at the receiver. The standard assumption of a constant interference during a link’s power update used in other works is relaxed. The performance of the proposed DPC is demonstrated analytically. The power used for all RTS-CTS-DATA-ACK frames is selected using the proposed DPC; hence, energy savings and spatial reuse are achieved. The hidden-terminal problem is overcome by periodically increasing the power. The NS simulator is used to compare the proposed scheme with 802.11. The proposed MAC protocol renders a significant increase in throughput in the presence of channel variations compared with 802.11 while consuming low energy per bit.

Keywords-component; Distributed Power Control, Fading Channels, Wireless Adhoc Networks, Convergence

I. INTRODUCTION

The objectives of transmitter power control include minimizing power consumption while increasing the network capacity and prolonging the battery life of mobile units by managing mutual interference so that each mobile unit can meet its signal-to-interference ratio (SIR) and other quality of service (QoS) requirements. Rigorous work on distributed power control (DPC) was performed for cellular networks. A few DPC schemes [2][3][4][5] were developed for wireless ad hoc networks where the topology of an ad hoc network constantly changes due to node mobility and communication link failures.

In an ad hoc network, RTS and CTS messages are used to establish a connection for data transmission between a transmitter and a receiver. In [2][3], the authors propose using maximum transmitter powers for RTS-CTS followed by DATA-ACK transmission at a much lower power, which is calculated according to RTS-CTS reception conditions. On the other hand, work in [2] suggested that calculating the transmitter power using a DPC scheme for all or certain RTS- CTS-DATA-ACK frames in 802.11 results in a degradation of

1 - Research Supported by NFS #0296191.

* - Contact author

QoS. More collisions will occur, thus causing a huge number of retransmissions. Consequently, this yields higher power consumption, low throughput per node and low network utilization. Additionally, the DPC schemes reported for ad hoc networks [2][3][4][5] do not show performance guarantees analytically.

Unlike wired networks, radio channel uncertainties in a wireless network, for instance path loss, Shadowing and Rayleigh fading can attenuate the power of the transmitted signal and thus cause variations in the received SIR and degrading the performance of any DPC. Low SIR means high bit error rate (BER), which is unsatisfactory. Reported DPC schemes in [2][3][4][5] assume that: 1) only path loss is present, 2) no other channel uncertainty exists, and 3) the mutual interference among the users is held constant during power update of each user. Moreover, improvement of spatial reuse factor is not adequately addressed. The proposed work overcomes these limitations.

In this paper, a novel DPC scheme and a MAC protocol is presented for wireless ad hoc networks in the presence of radio channel uncertainties. The proposed protocol uses the novel DPC scheme, which estimates the time-varying channel, and uses this information to update the power so that a target SIR is maintained at the receiver provided the channel variation is slow compared to its estimation. In addition, the proposed DPC scheme shown to converge analytically to any target SIR value in the presence of channel uncertainties such as Shadowing and Rayleigh fading. Moreover, the proposed MAC protocol assigns power adaptively for RTS-CTS frames while overcoming the hidden-terminal problem. Consequently, a modest improvement in spatial reuse factor is observed. Also, a comparison with 802.11 is included.

II. DPCALGORITHM

Radio channels involve many uncertain factors, so they are extremely random and do not offer easy analysis. We focus our effort on these main channel uncertainties, such as path loss, shadowing, and Rayleigh fading.

A. Radio channel with uncertainties

Path Loss: For path loss only, power attenuation is taken to follow the inverse 4th power law:

g

ij

= g / d

ijn, where

g

g

is a constant usually equal to 1,

d

ij is the distance between the

(2)

transmitter of the jth link and the receiver of the ith link and n is the path loss exponent with value of n=4 used to model path loss in an urban environment.

Shadowing: High buildings, mountains and other objects block wireless signals. The term

10

0.1ζ is often used to model the attenuation of the shadowing to the received power, where

ζ

is assumed to be a Gaussian random variable.

Rayleigh fading: In mobile radio channels, the Rayleigh distribution is commonly used to describe the statistical time varying nature of the received envelope of a flat fading signal, or the envelope of an individual multipath component. The Rayleigh distribution has a probability density function (pdf) given by:









 ≤ ≤∞



 

−

)

<

(x

) x ( σ x σ

= x p(x)

0 0

0 exp 2 2

2 2

(1)

where

x

is a random variable, and

σ

2 is known as the fading envelope of the Rayleigh distribution.

Since the channel uncertainties can distort the transmitted signals, therefore, the effect of these uncertainties is represented via a channel loss (gain) factor that typically multiplies the transmitter power. The channel gain or loss, g, can be expressed as:

( d, n, X, ζ ) = d 10

0.1

X

2

f

=

g

n

ζ

(2)

wheredn is the effect of path loss and

10

0.1ζ corresponds to the effect of shadowing. For Rayleigh fading, it is typical to model the power attenuation as

X

2 , where

X

is a random variable with Rayleigh distribution. Typically the channel gain, g, is a function of time.

B. Distributed Power Control (DPC)

Suppose there are N∈ Z+ links in the network. Let gij be the power loss (gain) from the transmitter of the jth link to the receiver of the ith link. The power attenuation is considered to follow the relationship given in equation (2).

Calculation of SIR, Ri

( )

t , at the receiver of ith link at the time instant t, is given by

( ) ( ) ( )

( ) ( ) ( )

( ) ( )

t P t

( )

t

g

t P t g t

I t P t t g R

i i

j

j ij

i ii

i i ii

i = =

(3)

where i, j

{

1,2,3,...,n

}

, Ii( )t is the interference, Pi

( )

t is the link’s transmitter power, Pj

( )

t are the transmitter powers of all other nodes, and ηi

( )

t >0 is the thermal noise at its receiver node. For each link i there is a lower SIR threshold γi and upper threshold γ*. Therefore, we require

( )

i*

i Ri t γ

γ ≤ ≤ (4)

for every i = 1,2,3,…n the lower threshold value for all links can be taken equal to

γ

for convenience, reflecting a certain QoS the link has to maintain in order to operate properly. An

upper SIR limit is also set, in order to manage the interference.

C. Proposed DPC algorithm

In this paper, a novel DPC scheme is given where both )

(t

gi and the interference Ii(t) are time-varying, and channel uncertainties are considered for all mobile users. In other words, in all existing works [1]-[5], both gi(t) and Pj(t) are held constant, whereas in our work, this assumption is relaxed.

Considering SIR from (3) where the power attenuationgij

( )

t is taken to follow the time-varying nature of the channel and differentiating (3) to get

( ) ( ( ) ( ) ) ( ) ( ( ) ( ) ) ( ) ( )

t

I

t I t P t g t I t P t t g

R

i

i ii i

ii

i 2

' '

'= − (5)

where Ri

( )

t ' is the derivative of Ri

( )

t and Ii

( )

t ' is the derivative of Ii

( )

t .

To transform the differential equation into the discrete time domain, x'

( )

t is expressed using Euler’s formula as

( ) ( )

T l x l

x +1 − , where T is the sampling interval. Equation (5) can be expressed in discrete time as

( ) ( ( ) ( ) ) ( ) ( ( ) ( ) ) ( ) ( )

( )

l

(

g

( ) ( )

lP l

)

I

( )

l

(

g

( ) ( )

lP l

)

I

( )

l

I

l I

l I l P l g l I l P l l g R

i i ii i

ii i

i

i ii i

ii i

' '

2

2

' '

'

1 [

+

=

= −

( ( ) ( )) ( ) ( ) ( )']



+

t l P l g l P l

g i

i j

j ij i

ii η (6)

In other words, ( )

( ) ( ) ( )

( ) ( )

[ ] ( ) [ ( ) ( )] ( )

( ) ( )

( ) ( )l PIl( )l

g

l l R

I

l g l P l P l P l g l g l

g l g l g

l R

i i ii

i i

i j

ij j j j ij ij

ii ii ii i

1

1 1 1

1

+ +

+

+ + +

+

= +

(7)

Now, define ( )

( ) ( ) ( )

( ) ( )

[ ]

( )

[

( ) ( )

]

( )

( ) ( )( )

( ) ( ) ( ) ( ) ( )l

I

l g l P l P l g l g

l g

l I

l g l P l P l P l g l g l

g l g l g

l

i i j

ij j j ij

ii ii

i i

j ij ij j j j ij

ii ii ii i

+

=

+ + +

+

=

1 1 1

α

( )

l gii

( )

l

i =

β and

( ) ( )

( )

l

I l l P v

i i i

+1

=

Equation (7) can be expressed as

( ) l ( ) ( ) l R l ( ) ( ) l v l

R

i

+1 = α

i i

+ β

i i (8)

with the inclusion of channel noise, equation (7) is written as

( )

l

( ) ( )

l R l

( ) ( ) ( ) ( )

l v l r l l

Ri +1 =

α

i i +

β

i i + i

ω

i (9)

where ω

( )

l is the zero mean stationary stochastic channel noise with ri

( )

l is its coefficient.

(3)

The SIR of each link at time instant, l , is obtained using (9). Carefully observing (9), it is clear that the SIR at the time instant l+1 is a function of channel variation from time instant l to l+1. The channel variation represented as α is not known; it has to be estimated for DPC development.

Now define yi

( ) ( )

k =Ri k in (9). Also

α

i,

β

i and

r

i are considered unknown. In this scenario, equation (9) can be expressed as

( ) [ ( ) ( ) ] ( ) ( ) ( ) ( ) ( ) ( )

l l

( ) ( )

l v l

l v l l

l l y r l l

y

i i i T i

i i i i i i i

β ψ θ

ω β α

+

=

+

 

= 

+ 1 (10)

where θi

( )

l =

[

αi

( ) ( )

l ri l

]

is a vector of unknown parameters, and

( ) ( )

( )

 

= l l l y

i i

i ω

ψ is the regression vector. Now selecting feedback for DPC as

( )

l =

( )

l 

( ) ( )

l l + +ke

( )

l 

vi βi1 θi ψi γ v i (11)

where θi

( )

l is the estimate of θi

( )

l , then the SIR error system is expressed as

( ) ( ) ( ) ( ) ( ) ( )

( )

l

( ) ( )

l l

e k

l l l l l e k l e

i T i i v

i T i i T i i v i

ψ θ

ψ θ ψ θ

~

1 +

=

− +

=

+ (12)

where θ~i

( )

l =θi

( )

l θi

( )

l is the error in estimation. From (12), the SIR error system is driven by channel estimation error. If the channel conditions are properly estimated, then estimation error tends to zero. In this case, SIR error goes to zero with time. In the presence of estimation error, only an SIR error bound can be shown. Next, Assumption 1 is required.

Assumption 1: The channel changes slowly compared to the parameters’ updates.

Remark: This assumption is valid due to the performance of embedded computer systems and the computationally simple estimation scheme.

Theorem 1: Given the DPC scheme above with channel uncertainties, if the feedback from the DPC scheme is selected as (11), then the mean channel estimation error along with the mean SIR error converges to zero asymptotically, if the parameter updates are taken as

( )

+1 =

( )

+

( ) ( )

+1

i l θi l σψi l eTi l

θ (13)

provided

( )

l 2<1 ψi

σ (14)

δ /

max<1

kv (15)

where

( )2

1 1

i l ψ δ σ

= and σ is the adaptation gain.

Proof: See Appendix.

Consider now the closed-loop SIR error system with channel estimation error, ε

( )

l , as

( )

l ke

( )

l

( ) ( ) ( )

l l l

e i

T i i v

i +1 = +θ~ ψ +ε . (16)

Theorem 2: Assume the hypothesis as given in Theorem 1, with the channel uncertainty is now estimated by

( )l ( )l ( ) ( )le l I ( ) ( ) ( )l il il T

i T

i i i

i

+ =θ +σψ + ψ ψ θ

θ 1 1 (17)

where ε

( )

l is an estimation error which is considered bounded above ε

( )

l ≤εN, with εN a known constant. Then the mean error of SIR and the estimated parameters are bounded, provided (14) and (15) hold.

III. POWER CONTROL MACPROTOCOL

For DPC implementation, the original MAC protocol has to be modified. These modifications occur at different layers.

Further, a novel idea based on [2] to overcome the hidden terminal problem is included. Then, the power selection for RTS-CTS-DATA-ACK is discussed.

Figure 1. Hidden terminal problem for DPC schemes.

The hidden terminal problem occurs in a wireless network when a third node causes collision to an ongoing communication between any two nodes. The problem is illustrated in Figure 1, where node A transmits data to node B.

Node F is outside the sensing range of transmitter A, and it will not detect transmission of the DATA frame that is sent from node A. Thus, F initiates transmission, which will collide with the DATA frame at the receiving node B. In Figure 1, all nodes located inside a marked region, called “Hidden Terminals' area”, are potential sources for this problem. The proposed DPC scheme uses much lower power for the transmission of frames. Hence, it results in increased collisions. A solution similar to others in [2] is proposed, though an improvement in contention time is observed.

Generally when a lower transmission power is used, the transmission and sensing range of a node will decrease [2] as shown in Figure 1. Node G will fail to detect transmission from node A and it will initiate transmission by assuming that the channel is idle. If node G uses maximum power, then a collision will occur at receiver node B. Hence, the probability of hidden terminal problem occurring in the network will increase when a low transmitter power is used.

(4)

To overcome this problem, in our proposed methodology, a train of short frames (pulses) with increased transmitted power is used periodically during transmission. The RTS, CTS, DATA and ACK frames are transmitted by using the power dictated by the proposed DPC along with the train of pulses.

The pulses use the maximum transmission power defined by the links of the network. This ensures that all the nodes in the sensing range of the transmitter will detect the pulses and update their NAV vectors accordingly. Thus, the nodes in the sensing range of the transmitter node will not cause collision.

Figure 2 shows the difference in handling of NAV vector with and without pulse train.

Figure 2. Periodic increase of power during frame transmission

A. Proposed MAC protocol

In the proposed protocol, only the initial RTS-CTS frames during link set-up have to be transmitted using maximum power defined by the link. Subsequently all frames, including RTS-CTS-DATA-ACK frames, will use transmission power calculated according to the proposed DPC scheme. The MAC header needs to be changed to allow power information to be sent between the communicating nodes.

In other words, the MAC frames have to embed the power information that is used for the current packet as well as for any subsequent response. This process repeats for all transmissions occurring between any two nodes A and B despite an increase in overhead, which causes a decrease in throughput. However, the observed increase in throughput, due to the smaller contention time, overcomes the penalty introduced by the overhead bits. Moreover, this overhead can be further reduced by using power levels. Consequently, the number of bits used for storing the power value in the header will decrease thus rendering low overhead. Additionally, these fields can be defined as optional in the frame header by using a one-bit flag.

Whenever the power level changes, this flag will be set and this indicates the receiving node to calculate its transmitting power for the subsequent transmission. Otherwise, the flag will be cleared and the node will continue to use its previous value.

Since a lower power is selected for transmission of the MAC frames, during severe fading, certain frames will be unsuccessfully decoded due to poor reception and they will be dropped. Consequently, retransmissions will occur with the same power value causing poor reception and further retransmissions. Hence, to prevent such a problem, the proposed protocol increases the transmission power by a given factor before each retransmission in order to reduce the packet drops.

B. Increase in Channel Utilization

Though hidden terminal problem increases with lower transmitter powers, however, an increase in channel utilization and throughput will be seen by using the proposed MAC protocol. Consider Figure 1 to understand the improvement in utilization that will occur when a lower transmitter power is used for subsequent RTS-CTS transmissions and when RTS- CTS handshake fails for any given nodes A and B. Then for instance node C will be able to start transmission earlier than in the case of using maximum power for RTS-CTS. As a result, the contention time for frames from certain nodes, such as C, decreases. Two scenarios are presented: first – maximum power used for RTS-CTS, where there is no improvement, and second, with RTS-CTS sent with power calculated by the DPC algorithm, where the improvement occurs. In both cases, node B will not respond since it is unable to receive the RTS message due to a collision. This will occur, for example, if node F will transmit at the same time as node A is trying to send the RTS frames. After predefined number of retransmissions, node A will cease to send the frame.

In the first scenario, node C will decode the RTS frame because it was sent with the maximum transmitter power defined by the links. Then node C will update its NAV vector using the RTS frame data. No transmission occurs; hence, the channel is idle. In the second scenario, where the RTS frame is sent at a power level calculated by the DPC, the node C will only detect the RTS frame and will set its NAV vector to the EIFS time. Hence, shortly after EIFS, node C is free to initiate communication. Due to the availability of channel to C, the throughput increases.

This second scenario applies to all nodes within the

“improvement area” depicted in Figure 1. Given the high density of nodes in the case of wireless ad hoc networks, the probability of a node accessing the channel is quite high.

Therefore, an increase in aggregated throughput is observed with the proposed protocol.

Due to better channel utilization, the spatial reuse factor, which is defined as the number of successful transmissions within a given time interval for a given area, will increase for the proposed DPC scheme. For 802.11, the NAV vector will be set for an entire expected duration of flow transmission; hence, there will be time intervals when no transmissions take place.

As the result, there will be fewer transmissions for a given time interval in comparison with the theoretical capacity of the radio channel. In our scheme, these idle periods are detected and nodes can transmit earlier, and thus the total number of successful transmission within a given time increases.

Consequently, the spatial reuse factor increases with the proposed DPC when compared to 802.11.

C. Contention time

The change in contention time for the proposed DPC scheme is due to two major factors: more retransmissions during fading channel conditions and improved channel utilization, which is explained in Section III.B. During fading channel conditions, retransmissions will increase with the proposed DPC due to a possibility of undesirable reception. As a result, the average contention time increases. Additionally,

(5)

high utilization due to the proposed DPC will increase in throughput causing congestion. Under these conditions, certain frames will be delayed longer compared to the case when 802.11 is used. Therefore, the contention time increases with the proposed DPC.

D. Protocol Implementation

The NS-2 simulator has been used for evaluating the proposed scheme. The modifications made to incorporate the DPC algorithm and protocol mainly focus on two layers of 802.11:

• Physical layer – modified to collect necessary data, like Interferences

• Medium Access (MAC) layer – here the DPC algorithm and protocol are implemented.

Floating-point variables are used for communicating power values. Separate short frames simulate the train of pulses. It is ensured that short-frames do not interfere with normal communication.

IV. SIMULATIONS

The 802.11 and proposed MAC protocols are evaluated under similar channel conditions, identical node placements, node movement and data flows (type, rate, start time, source, destination, etc.), and SIR thresholds, with a deterministic propagation model. The effect of path loss, shadowing and Rayleigh fading were introduced into the propagation model.

The path loss effect is calculated as in Propagation/Shadowing object from NS-2 simulator. The Shadowing and Rayleigh fading effects has been calculated in advance and stored in a sample file. This ensured that the channel uncertainties for compared simulations are the same. The calculation of power attenuation for shadowing and Rayleigh fading employ models from equation (3). Figure 3 shows sample attenuation observed for a random receiver node. The results were repeated for a number of different, randomly generated scenarios and they were averaged.

A. Simulator Parameters

The DSR routing protocol with 2Mbps radio channel rate was used. The topology consists of a 1000m x 1000m square area with 100 nodes placed and moving at random. The simulations are executed for 20 seconds. The CBR traffic is used for 50 flows, starting randomly during the first 2 seconds.

Each data flow generates steady traffic via 512 byte-long packets. The results were averaged over simulation trials using different fading effects, node placement and movement. The simulations were executed by varying the per-flow rates. The radio channel with 2Mbps bandwidth was used.

The maximum power used for 802.11 and proposed DPC is equal to 0.2818 [W]. The proposed DPC should maintain a target SIR of 5, while the minimum SIR for error-free reception is equal to 4 (~6db). The channel condition can change between time when the power was calculated and the time when this power is used. Hence, to overcome the unpredictable fading, the power calculated by the algorithm is multiplied by a factor equal to 2. For the proposed DPC, the design parameters are selected as Kv=0.01, and σ = 0.01. The power increase

factor in case of retransmissions is set to 1.5 for the proposed DPC scheme.

Figure 3. Shadowing, Path Loss and Rayleigh fading effects In random topology scenario, each flow can use different number of hops (mini-flows) between the source and the destination pair. This can lead to different end-to-end throughput depending on number of hops used in particular scenario. Hence, the mini-flow transmissions were used instead of end-to-end transmissions.

B. Results

Figure 4. Total data transmitted (mini-flows)

Figure 5. Total data per joule transmitted

The total data transmitted for all mini-flows is presented in Figure 4. Compared to 802.11, the proposed DPC transmits more data regardless of traffic flow rate. As the amount of data increases throughput does not increase suggesting that the channel is saturated. Figure 5 shows the energy efficiency characteristics of the protocols. Regardless of the traffic load, the proposed protocol allows transmission of more data per

(6)

joule when compared to 802.11. The average contention time is presented in Figure 6. The proposed protocol yields slightly higher contention time since more number of retransmissions will occur with lower power values. When a channel condition severely deteriorates, frame decoding could fail due to reduced power at the receiver, retransmission will increase thus increasing the average contention time. Additionally, the higher channel utilization causes an increase in congestion, and in consequence increases the contention time.

Figure 6. Contention time

V. CONCLUSIONS

A novel MAC power control protocol is presented for wireless ad hoc networks. It was seen that the proposed DPC scheme allows fully distributed power control and has rendered better performance in the presence of radio channel uncertainties. The proposed DPC scheme uses significantly less transmitter power per bit compared to 802.11; hence the energy is saved and life-time of wireless nodes extended.

Additionally, the network capacity is maximized in terms of high aggregate throughput. In conclusion, the proposed power control MAC protocol offers a superior performance in terms of convergence and maximizes the network capacity compared to 802.11 standards. Results justify theoretical conclusions.

The pulse train is sent at maximum power to prevent the hidden terminal problem. Hence, the increase in throughput is due to increased channel utilization and not due to the spatial reuse factor. To further increase the throughput and spatial reuse factor, the transmission power has to be changed dynamically for all frames. This amounts to adaptive selection of the first RTS-CTS exchange as well as power used for the train of pulses.

REFERENCES

[1] Seung-Jong Park and Raghupathy Sivakumar, “Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks”, in ICPPW'02, August 2002.

[2] Eun-Sun Jung and Nitin H. Vaidya “A Power Control MAC Protocol for Ad Hoc Networks”, in ACM MOBICOM, 2002.

[3] J. Gomez, A.T.Campbell, M.Naghshineh, C.Bisdikian, “Conserving Transmission Power in Wireless Ad Hoc Neworks”, in ICNP'01, November 2001

[4] P. Karn, “MACA – A New Channel Access Method for Packet Radio”, in Proc. 9th ARRL Computer Networking Conference, 1990

[5] M.B.Pursley, H.B. Russell, J.S.Wysocarski, “Energy Efficient Transmission and routing Protocols for Wireless Multiple-hop Networks and Spread-Spectrum Radios”, in EUROCOMM 2000, pages 1-5, 2000 [6] Daniela Maniezzo, Matteo Cesana, Mario Gerla, “IA-MAC:

Interference Aware MAC for WLANs”, UCLA-CSD Tech. Report Number 020037, December 2002.

APPENDIX

Proof of Theorem 1: Define the Lyapunov function

( ) ( )

+ 

( ) ( )



=e le l l l

J T i

i i T i i

~

1 ~

θ θ

σκ (A.1)

whose first difference is

( ) ( ) ( ) ( )

( ) ( ) ( ) ( )



 + + −

+

− + +

=

∆ +

=

l l l

l

l e l e l e l e

J J J

T i i T i

i

i T i i

T i

~

~

~

~ 2 1

1 1 1

1 1

θ θ θ

θ σκ

(A.2)

Consider J from (A.2) and substituting (12) to get 1 ( ) ( ) ( ) ( )

( )l ( ) ( )l l k e( )l ( ) ( )l l e ( ) ( )le l

e k

l e l e l e l e J

i T i i T i i v T i T i i v

i T i i T i

+

+

=

+ +

=

ψ θ ψ

θ~ ~

1 1 1 (A.3)

Taking the second term of the first difference from (A.2) and substituting (13) yields

( ) ( ) ( ) ( )

[ ( )] ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )  ( )+ ( ) ( )

 + +









=



 + +

=

l l l e k l l l e k l l

l l l l l l l e k

l l l

l J

i iT i v T i iT i v i T i

i iT T i iT i iT T i v

T i i T i

i

ψ θ ψ

θ ψ

σψ

ψ θ ψ θ ψ θ

θ θ θ θ σκ

~

~

~

~

~

~

~

~

~ 2

2 2

1 1 1

(A.4)

Combining (A.3) and (A.4) to get

( ) [ ( ( ) ( ) ) ] ( )

( ) ( ) ( ) [ ] ( ) ( ) ( ) ( )

( ) ( ) ( ) ( ) ( )

( ) ( ) ( ( ) )

( ) ( ) ( )

( ) ( )

2 2

~ 2

2 2 2

max

~

~

~

1

1 1

1 2

1

l e l k l l

l

l l

e k

l l l l l l

l l l e k l l

l e k k l l I

l e J

i v i i i

iT

i i

v

i iT T i iT i T i

i iT T i v i T i

i v T v i T i T

i

ψ σ

ψ ψ σ

θ

ψ σ δ

ψ θ ψ θ ψ σψ

ψ θ ψ

σψ

ψ σψ

− −











 +

+

=

(A.5)

where

δ

is given after (15). Taking now expectations on both sides yields

( ) ( ) ( ) ( ( ) )

( ) ( ) ( )

( ) ( )

)

1

1 1

(

2 2

~ 2

2 2 2

max

l e l k l l

l

l l

e k E J E

i v i i i

iT

i i

v

ψ σ

ψ ψ σ

θ

ψ σ δ

+ −

∆ (A.6)

Since E

( )

J >0 and E

( )

∆J0, this shows the stability in the mean via sense of Lyapunov provided the conditions (14) and (15) hold, so E

[ ]

ei

( )

l and E i

( )

l

θ~ (and henceE θi

( )

l ) are

bounded in the mean if E

[

ei

( )

l0

]

and E θ~i

( )

l0 are bounded in a mean. Sum both sides of (A.6) and take limits l E

( )

J

lim , the SIR errorE

[

ei

( )

l

]

0.

參考文獻

相關文件

The A-Level Biology Curriculum aims to provide learning experiences through which students will acquire or develop the necessary biological knowledge and

™ Independent networks (indep. basic service set, IBSS), also known as ad hoc networks.. ™

Shih, “On Demand QoS Multicast Routing Protocol for Mobile Ad Hoc Networks”, Special Session on Graph Theory and Applications, The 9th International Conference on Computer Science

Overview of NGN Based on Softswitch Network Architectures of Softswitch- Involved Wireless Networks.. A Typical Call Scenario in Softswitch- Involved

“Ad-Hoc On Demand Distance Vector Routing”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 90-100, 1999.. “Ad-Hoc On Demand

The PLCP Header is always transmitted at 1 Mbit/s and contains Logical information used by the PHY Layer to decode the frame. It

• As RREP travels backwards, each node sets pointer to sending node and updates destination sequence number and timeout entry for source and destination routes.. “Ad-Hoc On

Abstract— This paper has analyzed link probability, expected node degree, expected number of links, and expected area collectively covered by a finite number of nodes in wireless ad