Dynamic quorum policy for maximizing throughput in limited information multiparty MAC

In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multipa...

Full description

Saved in:
Bibliographic Details
Published inIEEE/ACM transactions on networking Vol. 14; no. 4; pp. 835 - 848
Main Authors Chaporkar, P., Sarkar, S., Shetty, R.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.08.2006
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1063-6692
1558-2566
DOI10.1109/TNET.2006.880175

Cover

Abstract In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns-2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks
AbstractList In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns-2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks
In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns-2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks.
In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns -2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks. [PUBLICATION ABSTRACT]
Author Sarkar, S.
Chaporkar, P.
Shetty, R.
Author_xml – sequence: 1
  givenname: P.
  surname: Chaporkar
  fullname: Chaporkar, P.
  organization: INRIA, Paris
– sequence: 2
  givenname: S.
  surname: Sarkar
  fullname: Sarkar, S.
– sequence: 3
  givenname: R.
  surname: Shetty
  fullname: Shetty, R.
BookMark eNp9kUtLxDAUhYMoqKN7wU1woauOeTWPpYzjA3xsxnVIM6lG2qamKTj-ejOOIMzC1T1cvnPhnnMIdrvQOQBOMJpijNTl4mm-mBKE-FRKhEW5Aw5wWcqClJzvZo04LThXZB8cDsM7Qpgiwg_Ay_WqM6238GMMcWxhHxpvV7AOEbbm07f-y3evML3FML6-9WOCvoNNXie3zDJjrUk-dLAdm-R7E9MKPl7NjsBebZrBHf_OCXi5mS9md8XD8-397OqhsLSkqSCWYsyYxLIWzqpKCSorR6hCoq6ZZVwIsRSmJMwpg3DGcOVKVMpKGWJERSfgYnO3j-FjdEPSrR-saxrTuTAOWkrFGFP57gSc_0sSJYRSjGfwbAt8D2Ps8heaEEEUlhhliG8gG8MwRFdr69NPECka32iM9LoUvS5Fr0vRm1KyEW0Z--hbE1f_WU43Fu-c-8NzNhwR-g06JpmC
CODEN IEANEP
CitedBy_id crossref_primary_10_1109_TAC_2008_929372
Cites_doi 10.1109/INFCOM.2002.1019424
10.1023/A:1016631911947
10.1109/MILCOM.2002.1179589
10.1109/WCNC.2000.904675
10.1145/345910.345955
10.1145/509506.509514
10.1109/MILCOM.1999.822631
10.1109/9.182479
10.1145/345910.345920
10.1109/MILCOM.2000.905017
10.1109/ICC.2004.1313275
10.1109/VETECF.2003.1286157
10.1145/345910.345925
10.1145/570738.570742
10.1109/TIT.2002.802619
10.1017/CBO9780511984020
10.1109/INFCOM.2000.832232
10.1109/MILCOM.2001.985991
10.1007/978-3-540-24663-3_10
10.1145/262116.262125
10.1007/s11235-004-5574-z
ContentType Journal Article
Copyright Copyright Association for Computing Machinery Aug 2006
Copyright_xml – notice: Copyright Association for Computing Machinery Aug 2006
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TNET.2006.880175
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database

Technology Research Database
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Statistics
EISSN 1558-2566
EndPage 848
ExternalDocumentID 1216712731
10_1109_TNET_2006_880175
1677602
Genre orig-research
Feature
GroupedDBID -DZ
-~X
.DC
0R~
29I
4.4
5GY
5VS
6IK
85S
8US
97E
9M8
AAJGR
AAKMM
AALFJ
AARMG
AASAJ
AAWTH
AAWTV
ABAZT
ABPPZ
ABQJQ
ABVLG
ACGFS
ACGOD
ACIWK
ACM
ADBCU
ADL
AEBYY
AEFXT
AEJOY
AENSD
AETEA
AETIX
AFWIH
AFWXC
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AIKLT
AKJIK
AKQYR
AKRVB
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BDXCO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CCLIF
CS3
D0L
EBS
EJD
FEDTE
GUFHI
HF~
HGAVV
HZ~
H~9
I07
ICLAB
IEDLZ
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
LHSKQ
M43
MVM
O9-
OCL
P1C
P2P
PQQKQ
RIA
RIE
RNS
ROL
TN5
UPT
UQL
VH1
XOL
YR2
ZCA
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
RIG
F28
FR3
ID FETCH-LOGICAL-c353t-2c31144818f7ec9b9738be23907ff4c46777d7a524e9a0118f1be5058b9a2a7b3
IEDL.DBID RIE
ISSN 1063-6692
IngestDate Thu Oct 02 05:47:57 EDT 2025
Sun Sep 28 12:34:30 EDT 2025
Fri Jul 25 04:03:42 EDT 2025
Thu Apr 24 23:09:19 EDT 2025
Wed Oct 01 02:31:49 EDT 2025
Tue Aug 26 16:37:43 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c353t-2c31144818f7ec9b9738be23907ff4c46777d7a524e9a0118f1be5058b9a2a7b3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
PQID 227291810
PQPubID 23500
PageCount 14
ParticipantIDs proquest_journals_227291810
crossref_citationtrail_10_1109_TNET_2006_880175
crossref_primary_10_1109_TNET_2006_880175
proquest_miscellaneous_29779946
proquest_miscellaneous_889444997
ieee_primary_1677602
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2006-08-01
PublicationDateYYYYMMDD 2006-08-01
PublicationDate_xml – month: 08
  year: 2006
  text: 2006-08-01
  day: 01
PublicationDecade 2000
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE/ACM transactions on networking
PublicationTitleAbbrev TNET
PublicationYear 2006
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref11
ref10
shwartz (ref25) 1995
ref17
ref16
chaporkar (ref26) 2004
mueller (ref2) 2004; 2965
chandra (ref19) 2001
ref24
ref23
marti (ref1) 2000
ref22
ref21
min-te sun (ref18) 2002
ref8
ref7
ref4
ref3
ref6
ref5
gopalsamy (ref9) 2002
pagani (ref20) 1997
References_xml – ident: ref4
  doi: 10.1109/INFCOM.2002.1019424
– ident: ref14
  doi: 10.1023/A:1016631911947
– ident: ref5
  doi: 10.1109/MILCOM.2002.1179589
– start-page: 563
  year: 2002
  ident: ref9
  article-title: a reliable multicast algorithm for mobile ad hoc networks
  publication-title: Proc IEEE ICDCS'02
– ident: ref17
  doi: 10.1109/WCNC.2000.904675
– start-page: 255
  year: 2000
  ident: ref1
  article-title: mitigating routing misbehaviour in mobile ad hoc networks
  publication-title: Proc ACM MobiCom 00
  doi: 10.1145/345910.345955
– ident: ref3
  doi: 10.1145/509506.509514
– ident: ref8
  doi: 10.1109/MILCOM.1999.822631
– ident: ref22
  doi: 10.1109/9.182479
– ident: ref6
  doi: 10.1145/345910.345920
– ident: ref16
  doi: 10.1109/MILCOM.2000.905017
– ident: ref11
  doi: 10.1109/ICC.2004.1313275
– ident: ref12
  doi: 10.1109/VETECF.2003.1286157
– ident: ref24
  doi: 10.1145/345910.345925
– ident: ref7
  doi: 10.1145/570738.570742
– ident: ref23
  doi: 10.1109/TIT.2002.802619
– ident: ref21
  doi: 10.1017/CBO9780511984020
– ident: ref10
  doi: 10.1109/INFCOM.2000.832232
– ident: ref15
  doi: 10.1109/MILCOM.2001.985991
– start-page: 275
  year: 2001
  ident: ref19
  article-title: anonymous gossip: improving multicast reliability in mobile ad hoc networks
  publication-title: Proc IEEE ICDCS'01
– year: 2002
  ident: ref18
  article-title: reliable mac layer multicast in ieee 802.11 wireless networks
  publication-title: ICPP'02
– year: 1995
  ident: ref25
  publication-title: Large Deviations for Performance Analysis Queues Communications and Computing
– volume: 2965
  start-page: 209
  year: 2004
  ident: ref2
  publication-title: Performance Tools and Application to Networked Systems
  doi: 10.1007/978-3-540-24663-3_10
– year: 2004
  ident: ref26
  publication-title: Dynamic strategies for maximizing throughput in multiparty MAC
– start-page: 34
  year: 1997
  ident: ref20
  article-title: reliable broadcast in mobile multihop packet networks
  publication-title: Proc ACM/IEEE MobiCom'97
  doi: 10.1145/262116.262125
– ident: ref13
  doi: 10.1007/s11235-004-5574-z
SSID ssj0013026
Score 1.8320686
Snippet In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 835
SubjectTerms Bandwidth
Bandwidths
Broadcasting
Computation
Design engineering
Distributed computing
MAC layer scheduling
Networks
Optimization
Policies
Protocol
Receivers
Routing
Stability
Statistics
Studies
Sufficient conditions
Telecommunication network reliability
Throughput
throughput optimal policy
Unicast
Wireless communication
wireless multicast
Wireless networks
Title Dynamic quorum policy for maximizing throughput in limited information multiparty MAC
URI https://ieeexplore.ieee.org/document/1677602
https://www.proquest.com/docview/227291810
https://www.proquest.com/docview/29779946
https://www.proquest.com/docview/889444997
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-2566
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0013026
  issn: 1063-6692
  databaseCode: RIE
  dateStart: 19930101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VnuBAgYJIS8EHLkhkN7EdP45VH6qQtqddqbfIjh1pRZtdaCKV_nrGdnZb8RK3SJkolmdsz3hmvg_gI3WBDalUeSWUy7mteG4NY7muWl-WLXfWhPuO2aW4WPAvV9XVDnze9sJ472PxmZ-Ex5jLd6tmCFdl01JIKQJy5BOpROrVesgYFJFaDSMclguh6SYlWejp_PJsntIOaKxlqCh8dARFTpXfNuJ4upzvwWwzrlRU8nUy9HbS3P8C2fi_A38Bz0c3kxwnu3gJO757Bc8egQ_uw-I0kdGTb0MAZCDriBBM0IklN-ZuebO8RzEy8vish54sO3Kd2qHICLcalEpSSSJa4A8yOz55DYvzs_nJRT6SLOQNq1if04ZhSMRRXa30jbZaMmU9ZRg0ty1vcB-V0klTUe61CW2qbWk9uk3KakONtOwN7Harzr8Fogqrm1IVTtOIQ6gK6alpHU6Hc8y2GUw38143IwJ5IMK4rmMkUug6aCoQY4o6aSqDT9sv1gl94x-y-2HiH-TSnGdwuFFtPS7P25pSjCnQtyky-LB9i-sqJEtM51cDiqBjrDUXGZC_SCilOceAUR78-c-H8DTd14RqwXew238f_BF6ML19H033JyJM7fY
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB5V5QAceBVEaKE-cEEiu4ntxPax6kMLdPe0K_UW2bEjrWiz25JI0F_P2M5uK17iFikTxfKM7RnPzPcBvKfWsyHlMi1KaVNuCp4azViqisblecOt0f6-YzorJwv--aK42IGP214Y51woPnMj_xhy-XZV9_6qbJyXQpQeOfJBwTkvYrfWXc4gC-RqGOOwtCwV3SQlMzWez07nMfGA5pr7msJ7h1BgVfltKw7ny9lTmG5GFstKvo76zozq219AG_936M_gyeBokqNoGc9hx7Uv4PE9-ME9WJxEOnpy3XtIBrIOGMEE3Vhypb8vr5a3KEYGJp9135FlSy5jQxQZAFe9WkksSkQb_EGmR8cvYXF2Oj-epAPNQlqzgnUprRkGRRwV1ghXK6MEk8ZRhmFz0_Aad1IhrNAF5U5p36ja5Mah4ySN0lQLw17Bbrtq3WsgMjOqzmVmFQ1IhDITjurG4nRYy0yTwHgz71U9YJB7KozLKsQimaq8pjw1ZllFTSXwYfvFOuJv_EN2z0_8nVyc8wT2N6qthgX6raIUowr0brIEDrdvcWX5dIlu3apHEXSNleJlAuQvElIqtEOlxJs___kQHk7m0_Pq_NPsyz48irc3vnbwAHa7m969RX-mM--CGf8EufbxQw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dynamic+quorum+policy+for+maximizing+throughput+in+limited+information+multiparty+MAC&rft.jtitle=IEEE%2FACM+transactions+on+networking&rft.au=Chaporkar%2C+P.&rft.au=Sarkar%2C+S.&rft.au=Shetty%2C+R.&rft.date=2006-08-01&rft.issn=1063-6692&rft.volume=14&rft.issue=4&rft.spage=835&rft.epage=848&rft_id=info:doi/10.1109%2FTNET.2006.880175&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TNET_2006_880175
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6692&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6692&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6692&client=summon