Dynamic quorum policy for maximizing throughput in limited information multiparty MAC
In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multipa...
Saved in:
| Published in | IEEE/ACM transactions on networking Vol. 14; no. 4; pp. 835 - 848 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.08.2006
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1063-6692 1558-2566 |
| DOI | 10.1109/TNET.2006.880175 |
Cover
| Abstract | In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns-2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks |
|---|---|
| AbstractList | In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns-2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns-2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks. In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. Multiparty communication, however, requires new design paradigms since systematic design techniques that have been used effectively in unicast and wireline multicast do not apply. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throughput. Therefore, the objective is to design a policy that maximizes the system throughput subject to maintaining stability. We present a sufficient condition that can be used to establish the throughput optimality of a stable transmission policy. We subsequently design a distributed adaptive stable policy that allows a sender to decide when to transmit using simple computations. The computations are based only on limited information about current transmissions in the sender's neighborhood. Even though the proposed policy does not use any network statistics, it attains the same throughput as an optimal offline stable policy that uses in its decision process past, present, and even future network states. We prove the throughput optimality of this policy using the sufficient condition and the large deviation results. We present a MAC protocol for acquiring the local information necessary for executing this policy, and implement it in ns -2. The performance evaluations demonstrate that the optimal policy significantly outperforms the existing multiparty schemes in ad hoc networks. [PUBLICATION ABSTRACT] |
| Author | Sarkar, S. Chaporkar, P. Shetty, R. |
| Author_xml | – sequence: 1 givenname: P. surname: Chaporkar fullname: Chaporkar, P. organization: INRIA, Paris – sequence: 2 givenname: S. surname: Sarkar fullname: Sarkar, S. – sequence: 3 givenname: R. surname: Shetty fullname: Shetty, R. |
| BookMark | eNp9kUtLxDAUhYMoqKN7wU1woauOeTWPpYzjA3xsxnVIM6lG2qamKTj-ejOOIMzC1T1cvnPhnnMIdrvQOQBOMJpijNTl4mm-mBKE-FRKhEW5Aw5wWcqClJzvZo04LThXZB8cDsM7Qpgiwg_Ay_WqM6238GMMcWxhHxpvV7AOEbbm07f-y3evML3FML6-9WOCvoNNXie3zDJjrUk-dLAdm-R7E9MKPl7NjsBebZrBHf_OCXi5mS9md8XD8-397OqhsLSkqSCWYsyYxLIWzqpKCSorR6hCoq6ZZVwIsRSmJMwpg3DGcOVKVMpKGWJERSfgYnO3j-FjdEPSrR-saxrTuTAOWkrFGFP57gSc_0sSJYRSjGfwbAt8D2Ps8heaEEEUlhhliG8gG8MwRFdr69NPECka32iM9LoUvS5Fr0vRm1KyEW0Z--hbE1f_WU43Fu-c-8NzNhwR-g06JpmC |
| CODEN | IEANEP |
| CitedBy_id | crossref_primary_10_1109_TAC_2008_929372 |
| Cites_doi | 10.1109/INFCOM.2002.1019424 10.1023/A:1016631911947 10.1109/MILCOM.2002.1179589 10.1109/WCNC.2000.904675 10.1145/345910.345955 10.1145/509506.509514 10.1109/MILCOM.1999.822631 10.1109/9.182479 10.1145/345910.345920 10.1109/MILCOM.2000.905017 10.1109/ICC.2004.1313275 10.1109/VETECF.2003.1286157 10.1145/345910.345925 10.1145/570738.570742 10.1109/TIT.2002.802619 10.1017/CBO9780511984020 10.1109/INFCOM.2000.832232 10.1109/MILCOM.2001.985991 10.1007/978-3-540-24663-3_10 10.1145/262116.262125 10.1007/s11235-004-5574-z |
| ContentType | Journal Article |
| Copyright | Copyright Association for Computing Machinery Aug 2006 |
| Copyright_xml | – notice: Copyright Association for Computing Machinery Aug 2006 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
| DOI | 10.1109/TNET.2006.880175 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Technology Research Database Technology Research Database Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Statistics |
| EISSN | 1558-2566 |
| EndPage | 848 |
| ExternalDocumentID | 1216712731 10_1109_TNET_2006_880175 1677602 |
| Genre | orig-research Feature |
| GroupedDBID | -DZ -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 85S 8US 97E 9M8 AAJGR AAKMM AALFJ AARMG AASAJ AAWTH AAWTV ABAZT ABPPZ ABQJQ ABVLG ACGFS ACGOD ACIWK ACM ADBCU ADL AEBYY AEFXT AEJOY AENSD AETEA AETIX AFWIH AFWXC AGQYO AGSQL AHBIQ AI. AIBXA AIKLT AKJIK AKQYR AKRVB ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BDXCO BEFXN BFFAM BGNUA BKEBE BPEOZ CCLIF CS3 D0L EBS EJD FEDTE GUFHI HF~ HGAVV HZ~ H~9 I07 ICLAB IEDLZ IES IFIPE IFJZH IPLJI JAVBF LAI LHSKQ M43 MVM O9- OCL P1C P2P PQQKQ RIA RIE RNS ROL TN5 UPT UQL VH1 XOL YR2 ZCA AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D RIG F28 FR3 |
| ID | FETCH-LOGICAL-c353t-2c31144818f7ec9b9738be23907ff4c46777d7a524e9a0118f1be5058b9a2a7b3 |
| IEDL.DBID | RIE |
| ISSN | 1063-6692 |
| IngestDate | Thu Oct 02 05:47:57 EDT 2025 Sun Sep 28 12:34:30 EDT 2025 Fri Jul 25 04:03:42 EDT 2025 Thu Apr 24 23:09:19 EDT 2025 Wed Oct 01 02:31:49 EDT 2025 Tue Aug 26 16:37:43 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c353t-2c31144818f7ec9b9738be23907ff4c46777d7a524e9a0118f1be5058b9a2a7b3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| PQID | 227291810 |
| PQPubID | 23500 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_227291810 crossref_citationtrail_10_1109_TNET_2006_880175 crossref_primary_10_1109_TNET_2006_880175 proquest_miscellaneous_29779946 proquest_miscellaneous_889444997 ieee_primary_1677602 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2006-08-01 |
| PublicationDateYYYYMMDD | 2006-08-01 |
| PublicationDate_xml | – month: 08 year: 2006 text: 2006-08-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE/ACM transactions on networking |
| PublicationTitleAbbrev | TNET |
| PublicationYear | 2006 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 ref11 ref10 shwartz (ref25) 1995 ref17 ref16 chaporkar (ref26) 2004 mueller (ref2) 2004; 2965 chandra (ref19) 2001 ref24 ref23 marti (ref1) 2000 ref22 ref21 min-te sun (ref18) 2002 ref8 ref7 ref4 ref3 ref6 ref5 gopalsamy (ref9) 2002 pagani (ref20) 1997 |
| References_xml | – ident: ref4 doi: 10.1109/INFCOM.2002.1019424 – ident: ref14 doi: 10.1023/A:1016631911947 – ident: ref5 doi: 10.1109/MILCOM.2002.1179589 – start-page: 563 year: 2002 ident: ref9 article-title: a reliable multicast algorithm for mobile ad hoc networks publication-title: Proc IEEE ICDCS'02 – ident: ref17 doi: 10.1109/WCNC.2000.904675 – start-page: 255 year: 2000 ident: ref1 article-title: mitigating routing misbehaviour in mobile ad hoc networks publication-title: Proc ACM MobiCom 00 doi: 10.1145/345910.345955 – ident: ref3 doi: 10.1145/509506.509514 – ident: ref8 doi: 10.1109/MILCOM.1999.822631 – ident: ref22 doi: 10.1109/9.182479 – ident: ref6 doi: 10.1145/345910.345920 – ident: ref16 doi: 10.1109/MILCOM.2000.905017 – ident: ref11 doi: 10.1109/ICC.2004.1313275 – ident: ref12 doi: 10.1109/VETECF.2003.1286157 – ident: ref24 doi: 10.1145/345910.345925 – ident: ref7 doi: 10.1145/570738.570742 – ident: ref23 doi: 10.1109/TIT.2002.802619 – ident: ref21 doi: 10.1017/CBO9780511984020 – ident: ref10 doi: 10.1109/INFCOM.2000.832232 – ident: ref15 doi: 10.1109/MILCOM.2001.985991 – start-page: 275 year: 2001 ident: ref19 article-title: anonymous gossip: improving multicast reliability in mobile ad hoc networks publication-title: Proc IEEE ICDCS'01 – year: 2002 ident: ref18 article-title: reliable mac layer multicast in ieee 802.11 wireless networks publication-title: ICPP'02 – year: 1995 ident: ref25 publication-title: Large Deviations for Performance Analysis Queues Communications and Computing – volume: 2965 start-page: 209 year: 2004 ident: ref2 publication-title: Performance Tools and Application to Networked Systems doi: 10.1007/978-3-540-24663-3_10 – year: 2004 ident: ref26 publication-title: Dynamic strategies for maximizing throughput in multiparty MAC – start-page: 34 year: 1997 ident: ref20 article-title: reliable broadcast in mobile multihop packet networks publication-title: Proc ACM/IEEE MobiCom'97 doi: 10.1145/262116.262125 – ident: ref13 doi: 10.1007/s11235-004-5574-z |
| SSID | ssj0013026 |
| Score | 1.8320686 |
| Snippet | In multiparty MAC, a sender needs to transmit each packet to a set of receivers within its transmission range. Bandwidth efficiency of wireless multiparty MAC... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 835 |
| SubjectTerms | Bandwidth Bandwidths Broadcasting Computation Design engineering Distributed computing MAC layer scheduling Networks Optimization Policies Protocol Receivers Routing Stability Statistics Studies Sufficient conditions Telecommunication network reliability Throughput throughput optimal policy Unicast Wireless communication wireless multicast Wireless networks |
| Title | Dynamic quorum policy for maximizing throughput in limited information multiparty MAC |
| URI | https://ieeexplore.ieee.org/document/1677602 https://www.proquest.com/docview/227291810 https://www.proquest.com/docview/29779946 https://www.proquest.com/docview/889444997 |
| Volume | 14 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2566 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0013026 issn: 1063-6692 databaseCode: RIE dateStart: 19930101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VnuBAgYJIS8EHLkhkN7EdP45VH6qQtqddqbfIjh1pRZtdaCKV_nrGdnZb8RK3SJkolmdsz3hmvg_gI3WBDalUeSWUy7mteG4NY7muWl-WLXfWhPuO2aW4WPAvV9XVDnze9sJ472PxmZ-Ex5jLd6tmCFdl01JIKQJy5BOpROrVesgYFJFaDSMclguh6SYlWejp_PJsntIOaKxlqCh8dARFTpXfNuJ4upzvwWwzrlRU8nUy9HbS3P8C2fi_A38Bz0c3kxwnu3gJO757Bc8egQ_uw-I0kdGTb0MAZCDriBBM0IklN-ZuebO8RzEy8vish54sO3Kd2qHICLcalEpSSSJa4A8yOz55DYvzs_nJRT6SLOQNq1if04ZhSMRRXa30jbZaMmU9ZRg0ty1vcB-V0klTUe61CW2qbWk9uk3KakONtOwN7Harzr8Fogqrm1IVTtOIQ6gK6alpHU6Hc8y2GUw38143IwJ5IMK4rmMkUug6aCoQY4o6aSqDT9sv1gl94x-y-2HiH-TSnGdwuFFtPS7P25pSjCnQtyky-LB9i-sqJEtM51cDiqBjrDUXGZC_SCilOceAUR78-c-H8DTd14RqwXew238f_BF6ML19H033JyJM7fY |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB5V5QAceBVEaKE-cEEiu4ntxPax6kMLdPe0K_UW2bEjrWiz25JI0F_P2M5uK17iFikTxfKM7RnPzPcBvKfWsyHlMi1KaVNuCp4azViqisblecOt0f6-YzorJwv--aK42IGP214Y51woPnMj_xhy-XZV9_6qbJyXQpQeOfJBwTkvYrfWXc4gC-RqGOOwtCwV3SQlMzWez07nMfGA5pr7msJ7h1BgVfltKw7ny9lTmG5GFstKvo76zozq219AG_936M_gyeBokqNoGc9hx7Uv4PE9-ME9WJxEOnpy3XtIBrIOGMEE3Vhypb8vr5a3KEYGJp9135FlSy5jQxQZAFe9WkksSkQb_EGmR8cvYXF2Oj-epAPNQlqzgnUprRkGRRwV1ghXK6MEk8ZRhmFz0_Aad1IhrNAF5U5p36ja5Mah4ySN0lQLw17Bbrtq3WsgMjOqzmVmFQ1IhDITjurG4nRYy0yTwHgz71U9YJB7KozLKsQimaq8pjw1ZllFTSXwYfvFOuJv_EN2z0_8nVyc8wT2N6qthgX6raIUowr0brIEDrdvcWX5dIlu3apHEXSNleJlAuQvElIqtEOlxJs___kQHk7m0_Pq_NPsyz48irc3vnbwAHa7m969RX-mM--CGf8EufbxQw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dynamic+quorum+policy+for+maximizing+throughput+in+limited+information+multiparty+MAC&rft.jtitle=IEEE%2FACM+transactions+on+networking&rft.au=Chaporkar%2C+P.&rft.au=Sarkar%2C+S.&rft.au=Shetty%2C+R.&rft.date=2006-08-01&rft.issn=1063-6692&rft.volume=14&rft.issue=4&rft.spage=835&rft.epage=848&rft_id=info:doi/10.1109%2FTNET.2006.880175&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TNET_2006_880175 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6692&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6692&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6692&client=summon |