2007
DOI: 10.1016/j.adhoc.2006.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Sufficient rate constraints for QoS flows in ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
111
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 92 publications
(112 citation statements)
references
References 21 publications
1
111
0
Order By: Relevance
“…Given a network graph G = (V, L), define its conflict graph to be G C = (L, L ′ ), where two links ℓ 1 and ℓ 2 are adjacent in the conflict graph if and only if they interfere with each other due to being in the same vicinity and hence cannot be simultaneously active. This interference model has been studied recently by a number of authors; for example, see Jain et al [16], Hamdaoui and Ramanathan [15], and Gupta, Musacchio and Walrand [11]. A special case of this model, where two links are considered to be interfering if and only if they are incident (in the network graph) to a common node, has been studied earlier by Hajek [12], Hajek and Sasaki [13], and Kodialam and Nadagopal [17].…”
Section: Introductionmentioning
confidence: 99%
“…Given a network graph G = (V, L), define its conflict graph to be G C = (L, L ′ ), where two links ℓ 1 and ℓ 2 are adjacent in the conflict graph if and only if they interfere with each other due to being in the same vicinity and hence cannot be simultaneously active. This interference model has been studied recently by a number of authors; for example, see Jain et al [16], Hamdaoui and Ramanathan [15], and Gupta, Musacchio and Walrand [11]. A special case of this model, where two links are considered to be interfering if and only if they are incident (in the network graph) to a common node, has been studied earlier by Hajek [12], Hajek and Sasaki [13], and Kodialam and Nadagopal [17].…”
Section: Introductionmentioning
confidence: 99%
“…The problem of transmission constraints has also been studied in [4], [12] and [16]. (We will denote the particular constraint considered at a time as (T )).…”
Section: Routing and Scheduling Aggregate Trafficmentioning
confidence: 99%
“…In the following we provide the performance of this LP solution. For this example we did not run the nonlinear optimization (11)- (12). However see [6], [20].…”
Section: Simulationsmentioning
confidence: 99%
“…But actually it is easier to compute cliques since they are made of closed links and nodes usually have a better knowledge of their neighborhood. So cliques are often preferred in the literature to compute constraints on flows [7], [11].…”
Section: A Network Modelmentioning
confidence: 99%
“…• power control where n can emit with a higher power to contact nodes within its carrier sensing range directly [3]; • a N-hop interference model where node n interferes with its N-hop neighbors; • localization informations [7]. The whole network interferences can be represented by a conflict graph where interfering links are linked.…”
Section: A Network Modelmentioning
confidence: 99%