Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Advanced Wireless Networks - 4G Technologies

.pdf
Скачиваний:
47
Добавлен:
17.08.2013
Размер:
21.94 Mб
Скачать

718 NETWORK MANAGEMENT

The structure of the clusters is dynamic. Thus, as nodes move about, the number and composition of the clusters change. Similarly, the nodes serving as cluster heads also change over time. Different algorithms for forming and maintaining clusters will be discussed below. The clusters should have the following properties:

(1)The clusters are neither too large nor too small. The message overhead of collecting data within large clusters will be high. Likewise, if we have very small clusters, then there will be many cluster heads, all of which will be controlled by the manager. Thus, the message overhead in transactions between the cluster heads and the manager is high.

(2)The clusters are formed such that node mobility does not result in frequent recomputation of the clusters. This property is necessary if we are to reduce the message overhead of maintaining clusters.

(3)Sometimes nodes move out of one cluster and into another but are not incorporated into the new cluster immediately. This is because cluster maintenance algorithms only run periodically and not continuously. The effect of this is that some percentage of nodes may be unmanaged by cluster heads for short periods of time. This is not really a problem (except for the message overhead in data collection) because these nodes are still in communication with the overall manager, and they can be directly managed by the manager.

It is important to make a distinction between the use of clusters for management vs clusters for routing. Clustering in ANMP is used to logically divide the network into a three-level hierarchy in order to reduce the message overhead of network management. Since ANMP is an application-layer protocol, ANMP presupposes the existence of an underlying routing protocol. Thus, the manager node can always reach any of the nodes in the ad hoc network (so long as they both lie in the same partition) and can manage them directly. Clustering simply introduces intermediate nodes called cluster heads for the purpose of reducing the message overhead. Thus, clustering algorithms used for management serve a weaker and different objective when compared with clustering algorithms used for routing.

In cluster-based routing [40], neighboring nodes form clusters and select a cluster head. Cluster heads have the responsibility of routing packets sent to nodes outside the cluster. It is easy to see that clustering here serves a fundamental goal of maintaining routes. Finally, we note that if the underlying routing protocol is cluster-based, ANMP could simply use these clusters for management as well. However, if the routing protocol is not cluster-based [41], the two clustering algorithms describe here form clusters and rely on routing support to exchange control messages.

Graph-based clustering is described first as a basic concept. After that the maintenance algorithm that deals with node mobility after clusters have been formed will be discussed. A node in the graph represents a mobile host in the network. There is an undirected link between two nodes if they are within transmission range of each other. For the purpose of clustering we assume the following.

(1)each node in the network has a unique ID;

(2)each node in the network maintains a list of its one-hop neighbors (recall that ANMP runs at the application layer, and therefore it can obtain this information from the network or MAC layer);

 

 

 

AD HOC NETWORK MANAGEMENT

719

 

 

3

7

 

 

 

 

 

 

 

 

 

C3

 

9

 

 

 

5

 

 

 

 

 

 

 

 

M

C2

 

11

 

 

 

 

 

 

 

 

 

4

10

 

 

 

 

 

 

 

 

2

 

 

 

1

 

 

 

Manager station

 

 

6

 

Cluster head

 

 

 

 

 

C1

8

12

 

 

 

 

 

 

 

 

Figure 18.8 Clusters formed using graphical clustering.

(3)Messages sent by a node are received correctly by all its neighbors within a finite amount of time.

In the algorithm, the node with minimum ID among its neighbors (which have not joined any other cluster) forms a cluster and becomes the cluster head. Upon hearing from a cluster head, each node that has not yet joined any cluster declares that it has joined a cluster. If any node has been included in more than one cluster, then all but one cluster head prunes the node entry from their list when they do not hear any information from that node.

Figure 18.8 illustrates cluster formation in a simple ad hoc network. The node with the minimum ID forms the cluster and becomes the cluster head. Here node 1 is the minimum ID node among its neighbors; therefore, it forms a cluster C1. Node 4 does not initiate cluster formation because it is not the minimum ID node among its neighbors. When node 2 broadcasts a message that it has joined cluster C1, node 4 realizes that it is now the minimum ID node. Since the cluster formation runs in a distributed way, it is possible that, by the time node 4 receives the broadcast message from node 2, node 3 has already initiated cluster formation, and node 5 also sends a message that it has joined some cluster C3. Thus, when node 4 starts cluster formation, it only includes the remaining nodes among its neighbors and from C2.

Because the node with minimum ID considers only its one-hop neighbors while forming the cluster, the nodes in a cluster are one hop away from the cluster head and at most two hops away from any other cluster mate when the cluster is formed. The information maintained by each node after clusters are formed is:

a neighbor list – a list of nodes that are one hop away;

a cluster list – a list of all nodes that are its cluster mates;

a ping counter – a counter that indicates the time steps elapsed since it last heard from its cluster head.

Cluster maintenance for graph-based clustering deals with the changes in the network topology. As a result, the clusters and cluster membership have to be updated. Changes in cluster membership are triggered when a node moves out of a cluster (and into another)

720 NETWORK MANAGEMENT

Manager station

3

Cluster head

Moved nodes

5

Moved cluster heads

M

2

 

4

1

6

8 12

C1

New cluster

Manager station

Cluster head

3

Moved nodes

5

Moved Cluster head

 

 

 

 

 

 

M

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

4

 

 

 

 

 

 

 

 

 

2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

6

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8

 

12

 

 

 

C1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

7

9

C3

11

10

C2

7

9

C3

11

10

C4

Figure 18.9 Effect of node mobility on clusters.

or when the cluster head itself moves out of a cluster (or, relatively speaking, cluster members move away from the cluster head). Figure 18.9 presents some illustrative cases. Figure 18.9(a) shows a situation where nodes move about but are still connected to at least one of their cluster mates (see Figure 18.8). Here, there is no need to recompute clusters. Figure 18.9(b) shows two scenarios: (1) when a node moves across the cluster boundary; and (2) when the cluster head gets disconnected. It can be seen that node 4 gets disconnected from all the members of its previous cluster. Since node 4 is two hops away from the cluster head of cluster C1, it sends a join request to node 2. On receiving such event from node 4, node 2 adds node 4 to its cluster list and broadcasts it to all the members. Meanwhile, nodes 10 and 11 discover that their cluster head has moved away, and they initiate cluster formation and form a new cluster C4. The previous example indicates an important property of the maintenance algorithm.

When new clusters are formed, all nodes in the cluster are one hop away from the cluster head. However, as nodes move about, we allow nodes to join clusters even if they are two

AD HOC NETWORK MANAGEMENT

721

hops away from the cluster head of an existing cluster. This flexibility drastically reduces the message overhead of the algorithm.

18.4.8.1 Performance of cluster maintenance algorithm

If a node is connected to at least one node in its cluster list, it is still considered to be part of that cluster. If a node detects that it has no links to any of its previous cluster mates, it either forms a new cluster by itself or joins another cluster. The algorithm should be able to differentiate between node movements within the cluster and movements across the cluster boundary. Four types of events that a node can detect as a result of mobility are identified. A node can detect: (1) a new neighbor, who is also a cluster mate; (2) that a previous neighbor and cluster mate has moved; (3) that it was previously directly connected to the cluster head but is no longer directly connected, or it was previously not directly connected but is now directly connected; (4) a new neighbor, who wants to join the cluster.

At every fixed interval, called a time step, each node locally creates a list of events that it has observed and sends it to its cluster head. The cluster heads collects these events and recomputes the cluster list. If there is any change in the cluster membership, the cluster head broadcasts the new list. Thus, whenever a node moves out of a cluster or joins a cluster, the message exchange is restricted to within that cluster. In order to minimize the number of cluster changes, a node is allowed to join a cluster if the cluster head is two hops away. The restriction of two hops (as opposed to, say, three hops) has been enforced to avoid the creation of big clusters.

In such a division of the network, the cluster head plays an important role. That is why a major event that can occur is the movement of the cluster head. To determine if the cluster head has moved away, a ping counter is used at each node. This counter gets incremented at every time step. If the counter at the cluster head crosses some threshold value, then the cluster head sends a ping message to all its cluster mates, indicating that it is still alive. If the cluster mates do not hear a ping after their ping counters cross a threshold, they assume that the cluster head is either dead or has moved out. Once a node detects such an event, it cannot be certain about its cluster list. New cluster(s) are formed with one-hop neighbors in the same way as the clusters were initially formed. It is easy to see that the frequency at which these pings are sent plays an important role in maintaining the clusters. If the ping frequency is small, then between consecutive pings, some nodes may be unmanaged by a cluster head (i.e. they do not belong to any cluster). Unfortunately, even though a high frequency of pings minimizes the number of nodes unmanaged by cluster heads, it results in a higher message overhead.

One method of reducing the number of ping messages while simultaneously keeping the fraction of nodes unmanaged by clusterheads small is to exploit information available at the MAC layer. The MAC layer in wireless networks periodically transmits a beacon to announce itself to its neighbors. Thus, the MAC layer keeps an updated list of its one-hop neighbors. If nodes transmit this list to their neighbors, changes in the cluster membership can be detected quickly. If the cluster head moves away, its departure will be noticed by the MAC layer of its one-hop neighbors. These nodes can act on this information to quickly reform clusters.

Another characteristic of ad hoc networks are partitions. If a subnetwork gets partitioned from the main network, it is treated as any other cluster because the protocol does not require

722 NETWORK MANAGEMENT

second

 

 

Only Pings

 

 

second

Ping + MAC layer information

40

 

 

 

 

 

40

 

 

 

 

 

35

 

 

 

 

 

35

 

 

 

 

 

per

 

 

 

 

 

per

 

 

 

 

 

30

 

 

 

 

 

30

 

 

 

 

 

Messages

25

 

 

 

 

 

Messages

25

 

 

 

 

 

20

 

 

 

 

 

20

 

 

 

 

 

15

 

 

 

 

 

15

 

 

 

 

 

10

 

 

 

 

 

10

 

 

 

 

 

of

 

 

 

 

 

of

 

 

 

 

 

5

 

 

 

 

 

5

 

 

 

 

 

Number

 

 

 

 

 

Number

 

 

 

 

 

0

10

20

30

40

50

0

10

20

30

40

50

0

0

 

 

Speed

 

 

 

 

Speed

 

 

 

 

 

 

 

 

 

 

 

 

nodes

 

 

Only Pings

 

 

nodes

Ping + MAC layer information

70

 

 

 

 

 

70

 

 

 

 

 

unmanaged

60

 

 

 

 

 

unmanaged

60

Ping=1

 

 

 

 

 

 

 

 

 

Ping=5

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

50

 

 

 

 

 

50

Ping=15

 

 

 

 

 

 

 

 

 

 

Ping=60

 

 

 

40

 

 

 

 

 

40

Ping=120

 

 

 

30

 

 

 

 

 

30

No Ping

 

 

 

 

 

 

 

 

 

 

 

 

 

 

of

 

 

 

 

 

of

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Percentage

20

 

 

 

 

 

Percentage

20

 

 

 

 

 

10

 

 

 

 

 

10

 

 

 

 

 

0

 

 

 

 

 

0

 

 

 

 

 

0

10

20

30

40

50

0

10

20

30

40

50

 

 

 

Speed

 

 

 

 

 

Speed

 

 

Figure 18.10 Message overhead and percentage of nodes unmanaged by cluster heads.

any information exchange between clusters. If a single node gets partitioned, it forms a cluster by itself. However, when it gets reconnected, it tries to join another cluster because the clusters of too small or too large a size are both inefficient from the point of view of network management.

To study the performance of this clustering algorithm, an ad hoc network was simulated in Chen et al. [39] in which the 30 nodes move randomly within a 1500 × 1500 unit box (for 60 nodes, the area of the playground was twice that, and so on). Each node selects a direction randomly uniformly in the range [0, 360] degrees. It moves along that direction for a length of time that is exponentially distributed. At the end of this time, it recomputes the direction and traveling time. When a node hits the edge of the box, it wraps around and emerges from the opposite edge. In the simulation, the same transmission power was used for all the nodes in the network and the ad hoc network was represented as an undirected graph with links between two nodes if they are within transmission range of each other. The average speed of nodes is 1–50 unit/s in different runs. The transmission range of a node is fixed at 450 units. Each reading is an average of 10 readings, and the simulation time is 1000 s. Finally, a packet loss probability of 103 in all simulations was assumed.

Figure 18.10 (upper part) shows the message overhead of the protocol for the case when only pings to detect topology changes (graph on the left) and when pings along with MAClayer information (the graph on the right) are used. The x-axis indicates the speed in units per second, and the y-axis shows the number of messages exchanged per second for cluster maintenance. Each curve in the graph depicts the message overhead incurred for different

REFERENCES 723

ping intervals, which vary from no ping (equivalent to infinite time steps) down to one ping message every time step. It may be noted that message overhead increases almost linearly with increase in speed. The message overhead when we use MAC-layer information shows similar behavior, but there are more messages exchanged. This is obvious because of the fact that nodes do not wait for the ping message from the cluster head. The clustering algorithm is triggered as soon as the nodes detect cluster head movement.

The same figure (lower part) shows the percentage of nodes unmanaged by cluster heads. The plot on the left is for the case when only pings are used to detect topology changes, while the graph on the right is for the case when pings as well as MAC-layer information to detect topology changes are used. It can be seen from the graph that at higher speeds the percentage of nodes unmanaged by cluster heads goes up. This is mainly because of frequent disconnections and partitions generated in the network. Interestingly, the percentage of nodes unmanaged by cluster heads is as high as 50–70 % when we only use pings, but stays below 10 % when we use MAC-layer connectivity information as well.

REFERENCES

[1]www.snmp.com/

[2]W. Stallings, SNMP, SNMPv2, and RMON: Practical Network Management, 2nd edn., Addison-Wesley: Reading, MA, 1996.

[3]M. Rose, The Simple Book: an Introduction to Network Management, 3rd edn. Prentice Hall: Upper Saddle River, NJ, 1996.

[4]http://netman.cit.buffalo.edu/index.html

[5]J. Case, M. Fedor, M. Schoffstall and J. Davin, a simple network management protocol (SNMP), IETF, RFC 1157, 1990.

[6]Information Technology – Open Systems Interconnection-Common Management Information Protocol Definition, ITU-T, Geneva, ITU Recommendation X.711, 1992.

[7]W. Stallings, SNMP and SNMPv2: the infrastructure for network management, IEEE Commun. Mag., vol. 36, 1998, pp. 37–43.

[8]A. Leinwand and K. Fang, Network Management: A Practical Perspective. AddisonWesley: Reading, MA, 1993.

[9]W. Stallings, SNMP, SNMPv2, and CMIP: the Practical Guide to Network Management Standards, 1st edn. Addison-Wesley: Reading, MA, 1993.

[10]L. Raman, OSI systems and network management, IEEE Commun. Mag., vol. 36, 1998, pp. 46–53.

[11]M. Kahani and H.W.P. Beadle, Decentralised approach for network management, ACM SIGCOM Comput. Commun. Rev., 1997, pp. 36–47.

[12]G. Goldszmidt and Y. Yemini, Delegated agents for network management, IEEE Commun. Mag., vol. 36, 1998, pp. 66–70.

[13]M. Kahani and H. Beadle, Decentralized approaches for network management, Computer Commun. Rev., vol. 27, 1997, pp. 36–47.

[14]S. Vinoski, CORBA: integrating diverse applications within distributed heterogeneous environments, IEEE Commun. Mag., vol. 35, 1997, pp. 46–55.

[15]M. Greenberg, J. Byington and D. Harper, Mobile agents and security, IEEE Commun. Mag., vol. 36, 1998, pp. 76–85.

724 NETWORK MANAGEMENT

[16]V. Pham and A. Karmouch, Mobile software agents: an overview, IEEE Commun. Mag., vol. 36, 1998, pp. 26–37.

[17]D. Milojicic, F. Douglis and R. Wheeler, Mobility Processes, Computers and Agents,

D.Milojicic, F. Douglis and R. Wheeler (eds). ACM Press,1999.

[18]A. Fuggetta, G. Picco and G. Vigna, Understanding code mobility, IEEE Trans. Software Engng, vol. 24, 1998, pp. 342–361.

[19]M. Baldi and G. Picco, Evaluating the tradeoffs of mobile code design paradigms in network management applications, in Proc. ICSE’98, Kyoto, 19–25 April 1998, pp. 146–155.

[20]M. Siegl and G. Trausmuth, Hierarchical network management: A concept and its prototype in SNMPv2, Comput. Networks ISDN Syst., vol. 28, 1996, pp. 441–452.

[21]J. Stamos and D. Gifford, Remote evaluation, ACMTrans. Prog. Lang. and Syst., vol. 12, 1990, pp. 537–565.

[22]A. Bieszczad, B. Pagurek and T. White, Mobile agents for network management, IEEE Commun. Surv., vol. 1, no. 4Q, 1998, pp. 2–9.

[23]A.T. Campbell, H.G. de Meer, M.E. Kounavis, K. Miki, J. Vicente and D. Villela,

Asurvey of programmable networks, ACM Comput. Commun. Rev., vol. 29, 1999, pp. 7–23.

[24]A. Puliafito, O. Tomarchio and L. Vita, MAP: design and implementation of a mobile agent platform, J. Syst. Architect., vol. 46, 2000, pp. 256–267.

[25]H. De Meer, A. La Corte, A. Puliafito and O. Tomarchio, Programmable agents for flexible QoS management in IP networks, IEEE J. Select. Areas Commun., vol. 18, 2000, pp. 145–162.

[26]M.R. Genesereth and S.P. Ketchpel, Software agents, Commun. ACM, vol. 37, 1994, pp. 48–53.

[27]D.S. Alexander, W.A. Arbaugh, A.D. Keromytis and J.M. Smith, The switchware active network architecture, IEEE Network, vol. 12, 1998, pp. 29–36.

[28]D. Tennenhouse, S.M. Smith W.D. Sincoskie, D.J. Weatheall and G.J. Minden, A survey of active networks research, IEEE Commun. Mag., vol. 35, 1997, pp. 80–85.

[29]IEEE Networks, Special Issue on Programmable Networks, vol. 12, May/June 1998.

[30]AdventNet Management APIs. Available at: www.adventnet.com

[31]A. Bivens, L. Gao, M.F. Hulber and B. Szymanski, Agent-based network monitoring, in Proc. Autonomous Agents99 Conf., Workshop 1, Agent Based High Performance Computing: Problem Solving Applications and Practical Deployment, Seattle, WA, May 1999, pp. 41–53.

[32]M.S. Greenberg, J.C. Byington and T. Holding, Mobile agents and security, IEEE Commun. Mag., vol. 7, 1998 pp. 76–85.

[33]A. Puliafito and O. Tomarchio, Using mobile agents to implement flexible network management strategies, Comput. Commun. J., vol. 23, 2000, pp. 708–719.

[34]Z. Wang and J. Crowcroft, Quality-of-service routing for supporting multimedia applications, IEEE J. Select. Areas Commun., vol. 14, 1996, pp. 1228–1234.

[35]S. Papavassiliou, A. Puliafito, O. Tomarchio and J. Ye, Mobile agent-based approach for efficient network management and resource allocation: framework and applications, IEEE J. Select. Areas Commun., vol. 20, no. 4, 2002, pp. 858–872.

[36]R. Zahavi and T.J. Mowbray, The Essential CORBA: Systems Integration Using Distributed Objects. Wiley: New York, 1995.

REFERENCES 725

[37]D.E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley: Reading, MA, 1989.

[38]Z. Michalewicz, Genetic Algorithms + Data Structure = Evolution Programs. Springer: New York, 1992.

[39]W. Chen, N. Jain and S. Singh, ANMP: ad hoc network management protocol, IEEE J. Select. Areas Commun., vol. 17 no. 8, 1999, pp. 1506–1531.

[40]M. Gerla and T.J. Tzu-Chich, Multicluster, mobile, multimedia radio network, ACMBaltzer J. Wireless Networks, vol. 1, 1995, pp. 255–266.

[41]D.B. Johnson and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile Computing, T. Imielinski and H. F. Korth (eds). Kluwer: Norwell, MA, 1996, pp. 153–181.

[42]K. Terplan, Communication Network Management. Prentice-Hall: Englewood Cliffs, NJ, 1989.

[43]Mobile MIB Taskforce, System Components, Available at: www.epilogue.com/mmtf/

[44]J. Pavon and J. Tomas, CORBA for network and service management in the TINA framework, IEEE Trans. Commun., vol. 36, 1998, pp. 72–79.

[45]G. Goldszmidt and Y. Yemini, Delegated agents for network management, IEEE Trans. Commun., vol. 36, 1998, pp. 66–70.

[46]V.S. Acosta, OSF/DME (Distributed Management Environment). Available at: www.frontiernet.net/vsa184/papers/osf dme.htm, 1998.

[47]OMG. CORBA Overview. Available at: www.infosys.tuwien.ac.at/Research/Corba/ OMG/arch2.htm#446864, 1998.

[48]U. Blumenthal and B. Wijnen, User-based security model (USM) for version 3 of the simple network management protocol (SNMPv3), RFC 2274, January 1998.

[49]B. Wijnen, R. Presuhn and K. McCloghrie, View-based access control for the simple network management protocol (SNMP), RFC 2275, January 1998.

[50]C.P. Pfleeger, Security in Computing, 2nd edn. Prentice-Hall: Englewood Cliffs, NJ, 1997.

[51]G.-H. Chiou and W.-T. Chen, Secure broadcasting using secure lock, IEEE Trans. Software Engng, vol. 15, 1989, pp. 929–933.

[52]L. Gong and N. Shacham, Multicast security and its extension to a mobile environment, Wireless Networks, vol. 1, August 1995, pp. 281–295.

[53]J. McLean, The specification an modeling of computer security, IEEE Comput. vol. 3, 1990, pp. 9–17.

[54]Network Management Server. Available at: http://netman.cit.buffalo.edu/index.html, 1998.

[55]U. Blumenthal and B. Wijnen, User-based security model (USM) for version 3 of the simple network management protocol (SNMPv3), RFC 2274, January 1998.

[56]B. Wijnen, R. Presuhn and K. McCloghrie, View-based access control for the simple network management protocol (SNMP), RFC 2275, January 1998.

[57]R. Lin Chunhung and M. Gerla, Adaptive clustering for mobile wireless networks, IEEE J. Select. Areas Commun., vol. 15, 1997, pp. 1265–1274.

[58]SNMP Research Group, The EMANATE run-time extensible agent system, SNMP Version 3 Charter. Available at: www.snmp.com/emanateintro.html, 1998.

[59]SNMP Version3 Charter. Available at: www.ieft.org/html.charters/snmpv3-charter. html, 1998.

726 NETWORK MANAGEMENT

[60]D.J. Sidor, TMN Standards: Satisfying today’s needs while preparing for tomorrow, IEEE Commun. Mag., vol. 36, 1998, pp. 54–64.

[61]Mobile Management Task Force, Mobile MIB Draft 2.0, Available at: www.epilogue. com/mmtf/, 1998.

[62]C.E. Perkins and P. Bhagwat, Routing over multi-hop wireless network of mobile computers, in Mobile Computing, T. Imielinski and H. F. Korth (eds). Kluwer: Norwell, MA, 1996, pp. 183–205.

[63]C.-K. Toh, The Cambridge ad hoc mobile routing protocol, in Wireless ATM and Ad Hoc Networks, Chap. 9. Kluwer: Reading, MA, 1997.

19

Network Information Theory

Information theory has made a significant contribution to the development of communication theory and practice. This is especially true in the domain of physical layer including channel capacity issues, coding and modulation. Unfortunately, information theory has not yet made a comparable mark in the field of communication networks, which is today the center of activity and attention in most information technology areas. The principal reason for this is twofold. First, by focusing on the classical point-to-point, source–channel– destination model of communication, information theory has ignored the bursty nature of real sources. In advanced networks, source burstiness is the central phenomenon that underlies the process of resource sharing for communication. Secondly, by focusing on the asymptotic limits of the tradeoff between accuracy and rate of communication, information theory ignored the role of delay as a parameter that may affect this tradeoff. In networking, delay is a fundamental quantity, not only as a performance measure, but also as a parameter that may control and affect the fundamental limits of the rate–accuracy tradeoff.

A comprehensive survey of information theory contributions to the study of different network layers is given in Ephremides and Hajek [1]. The effective capacity of communications links including time-varying channel capacity, adaptive coding and modulation and queueing has already been discussed in Chapters 4 and 8. In this chapter we additionally discus the effective capacity of advanced cellular network, transport capacity of wireless networks and network coding.

19.1 EFFECTIVE CAPACITY OF ADVANCED CELLULAR NETWORKS

In this section we discuss effective capacity and capacity losses in an advanced CDMA network due to imperfections in the operation of the system components. In addition to the standard WCDMA technology both base stations and mobile units use antenna beam forming and self-steering to track the incoming (and transmitted) signal direction. By using high

Advanced Wireless Networks: 4G Technologies Savo G. Glisic

C 2006 John Wiley & Sons, Ltd.