- About this Journal
- Abstracting and Indexing
- Aims and Scope
- Annual Issues
- Article Processing Charges
- Articles in Press
- Author Guidelines
- Bibliographic Information
- Citations to this Journal
- Contact Information
- Editorial Board
- Editorial Workflow
- Free eTOC Alerts
- Publication Ethics
- Reviewers Acknowledgment
- Submit a Manuscript
- Subscription Information
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 639761, 17 pages
Self-Stabilizing TDMA Algorithms for Dynamic Wireless Ad Hoc Networks
1Computer Science Department, Centre Universitaire d####^~^~^~^~^~^####x2019;Informatique, University of Geneva, Battelle b####^~^~^~^~^~^####xe2;timent A, Route de Drize 7, Carouge, 1227 Geneva, Switzerland
2Chalmers University of Technology, R####^~^~^~^~^~^####xe4;nnv####^~^~^~^~^~^####xe4;gen 6B, 412 96 G####^~^~^~^~^~^####xf6;teborg, Sweden
Received 31 January 2013; Accepted 11 June 2013
Academic Editor: Kayhan Gulez
Copyright © 2013 Pierre Leone and Elad M. Schiller. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
In dynamic wireless ad hoc networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust as well as have high bandwidth utilization, high predictability degree of bandwidth allocation, and low communication delay in the presence of frequent topological changes to the communication network. Recent studies have shown that existing implementations cannot guarantee the necessary satisfaction of these timing requirements. We propose a self-stabilizing MAC algorithm for DynWANs that guarantees a short convergence period, and by that, it can facilitate the satisfaction of severe timing requirements, such as the above. Besides the contribution in the algorithmic front of research, we expect that our proposal can enable quicker adoption by practitioners and faster deployment of DynWANs that are subject changes in the network topology.
Dynamic wireless ad hoc networks (DynWANs) are autonomous and self-organizing systems where computing devices require networking applications when a fixed network infrastructure is not available or not preferred to be used. In these cases, computing devices may set up a short-lived network for the communication needs of the moment, also known as an ad hoc network. Ad hoc networks are based on wireless communications that require implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust and have high bandwidth utilization, a high predictability degree of bandwidth allocation, and low communication delay  in the presence of frequent changes to the communication network topology. Existing implementations cannot guarantee the necessary satisfaction of timing requirements [2, 3]. This work proposes an algorithmic design for self-stabilizing MAC protocols that guarantees a short convergence period and, by that, can facilitate the satisfaction of severe timing requirements. The proposed algorithm possesses a greater degree of predictability, while maintaining low communication delays and high throughput.
The dynamic and difficult-to-predict nature of wireless ad hoc networks give rise to many fault tolerance issues that requires efficient solutions. DynWANs, for example, are subject to transient faults due to hardware/software temporal malfunctions or short-lived violations of the assumed settings for modeling the location of the mobile nodes. Fault tolerant systems that are self-stabilizing  can recover after the occurrence of transient faults, which can cause an arbitrary corruption of the system state (so long as the program####^~^~^~^~^~^####x2019;s code is still intact), or the model of dynamic networks in which communication links and nodes may fail and recover during normal operation . The proof of self-stabilization requires convergence from an arbitrary starting system state. Moreover, once the system has converged and followed its specifications, it is required to do so forever. The self-stabilization design criteria liberate the application designer from dealing with low-level complications, such as bandwidth allocation in the presence of topology changes, and provide an important level of abstraction. Consequently, the application design can easily focus on its task and knowledge-driven aspects.
The IEEE 802.11 standard is widely used in wireless communications. Nonetheless, the research field of MAC protocols is very active and requires further investigation. In fact, the IEEE 802.11 amendment, IEEE 802.11p, for wireless access in vehicular environments (WAVE), has just being published. It was shown that the standard####^~^~^~^~^~^####x2019;s existing implementations cannot guarantee channel access before a finite deadline [2, 3]. Therefore, applications with severe timing requirements cannot predictably meet their deadlines, for example, safety-critical applications for vehicular systems.
ALOHAnet and its synchronized version slotted ALOHA  are pioneering wireless systems that employ a strategy of ####^~^~^~^~^~^####x201c;random access.####^~^~^~^~^~^####x201d; Time division multiple access (TDMA)  is another early approach, where nodes transmit one after the other, each using its own timeslot, say, according to a defined schedule. Radio transmission analysis in ad hoc networks  and relocation analysis of mobile nodes  show that there are scenarios in which MAC algorithms that employ a scheduled access strategy have lower throughput than algorithms that follow the random access strategy. However, the scheduled approach offers greater predictability of bandwidth allocation and communication delay, which can facilitate fairness  and energy conservation .
Our design choices have basic radio technology in mind, whilst aiming at satisfying applications that have severe timing requirements. We consider TDMA frames with fixed number of fixed-length timeslots. The design choice of TDMA frames with fixed-length radio time fits well applications that have severe delay requirements. By avoiding the division of fixed-length frames into timeslots of non-equal length, as in [10, 12], we take into consideration the specifications of basic radio technology.
In the context of the previous design choices, there are two well-known approaches for dealing with contention (timeslot exhaustion): (1) employing policies for administering message priority (for meeting timing requirements while maintaining high bandwidth utilization, such as ) or (2) adjusting the nodes####^~^~^~^~^~^####x2019; individual transmission signal strength or carrier sense threshold . The former approach is widely accepted and adopted by the IEEE 802.11p standard, whereas the latter has only been evaluated via computer simulations. The proposed algorithm facilitates the implementation of both of the previous approaches. We consider implementation details of the standard approach in Section 7.
For the sake of presentation simplicity, we start by considering a single priority MAC protocol and base the timeslot allocation on vertex coloring, before considering multipriority implementation in Section 7. The proposed algorithm allocates timeslots to a number of nearby transmitters, that is, a number that is bounded by the TDMA frame size, whereas nonallocated transmitters receive busy channel indications. The analysis considers saturated situations in which the node degree in the message collision graph is smaller than the TDMA frame size. As explained previously, this analysis assumption does not restrict the number of concurrent transmitters when implementing the proposed MAC algorithm.
1.1. Related Work
We are not the first to propose a MAC algorithm for DynWANs that follows the TDMA####^~^~^~^~^~^####x2019;s scheduled approach. STDMA  and Viqar and Welch  consider global navigation satellite system -based scheduling (GNSS)  according to the nodes####^~^~^~^~^~^####x2019; geographical position and their trajectories. Autonomous systems cannot depend on GNSS services, because they are not always available, or preferred not to be used, due to their cost. Arbitrarily long failure of signal loss can occur in underground parking lots and road tunnels. We propose a self-stabilizing TDMA algorithm that does not require GNSS accessibility or knowledge about the node trajectories. Rather, it considers an underlying self-stabilizing local pulse synchronization, such as [18, 19], which can be used for TDMA alignment; details appear in .
When using collision detection at the receiving side [14, 15, 20####^~^~^~^~^~^####x2013;22], it is up to the receiving side to notify the sender about collisions via another round of collision-prone transmissions, say, by using frame information (FI) payload fields that include entries, where is the TDMA frame size. Thus far, the study of FI-based protocols has considered stochastic resolution of message collision via computer network simulation [15, 20, 22####^~^~^~^~^~^####x2013;25]. Simulations are also used for evaluating the heuristics of MS-ALOHA  for dealing with contention (timeslot exhaustion) by adjusting the nodes####^~^~^~^~^~^####x2019; individual transmission signal strength and/or carrier sense threshold. We do not consider lengthy frame information (FI) fields, which significantly increase the control information overhead, and yet we provide provable guarantee regarding the convergence time. Further analysis validation of the proposed algorithm via simulations and testbed implementation can be found in Section 8, and respectively, in .
The proposed algorithm does not consider collision detection mechanisms that are based on signal processing or hardware support, as in . Rather, it employs a variation of a well-known strategy for eventually avoiding concurrent transmissions among neighbors. This strategy allows the sending side to eventually observe the existence of interfering transmissions. Before sending, the sender waits for a random duration while performing a clear channel assessment using basic radio technology (details appear in Section 3).
There are several MAC algorithms that are based on clear channel assessment. A recent example, , focuses on fair bandwidth allocation for single-hop-distance broadcasting while basing the interference model on discrete graphs. The authors do not consider self-stabilization. This work also considers clear channel assessment. However, we employ a strategy of random transmission delay in a way that allows the recipients to notice, in a probabilistic manner, prospective transmissions. We show that after a small number of rounds, the system is able to use the previous strategy for allocating the network bandwidth for single-hop-distance broadcasting when basing the interference model on discrete graphs. Further mitigation efforts of transmission pathologies, such as hidden terminal phenomena when unicast are considered, can be taken, for example, self-stabilizing two-hop-distance vertex coloring , equalizing transmission power, and coding-based methods , to name a few.
An abstract MAC layer was specified for DynWANs in . The authors mention algorithms that can satisfy their specifications. However, they do not consider predictability.
Local algorithms [30, 31] consider both theoretical and practical aspects of MAC algorithms ( and references therein) and the related problem of clock synchronization; see  and references therein. For example, the first partly-asynchronous self-organizing local algorithm for vertex coloring in wireless ad hoc networks is presented in . However, this line currently does not consider dynamic networks and predictable bandwidth allocation.
Two examples of self-stabilizing TDMA algorithms are presented in [10, 35]. The algorithms are based on vertex-coloring and the authors consider (nondynamic) ad hoc networks. Recomputation and floating output techniques (, Section 2.8) are used for converting deterministic local algorithms to self-stabilization in . The authors focus on problems that are related to MAC algorithms. However, deterministic MAC algorithms are known to be inefficient in their bandwidth allocation when the topology of the communication network can change frequently . There are several other proposals related to self-stabilizing MAC algorithms for sensor networks, for example, [37####^~^~^~^~^~^####x2013;40]; however, none of them consider dynamic networks, and their frame control information is quite extensive.
The MAC algorithms in [9, 18, 41, 42] have no proof that they are self-stabilizing. The authors of  present a MAC algorithm that uses convergence from a random starting state (inspired by self-stabilization). In [18, 41, 42], the authors use computer network simulators for evaluating self-####^~^~^~^~^~^####x22c6; MAC algorithms.
1.2. Our Contribution
This work proposes a self-stabilizing MAC algorithm that demonstrates rapid convergence without the extensive use of frame control information. Our analysis shows that the algorithm facilitates the satisfaction of severe timing requirements for DynWANs.
We start by considering transient faults and topological changes to the communication network, that is, demonstrating self-stabilization in Theorem 2. We then turn to focus on bounding the algorithm####^~^~^~^~^~^####x2019;s convergence time after an arbitrary and unbounded finite sequence of transient faults and changes to the network topology. Theorem 3 shows that the expected local convergence time is brief and bounds it in (7). Theorem 7 formulates the expected global convergence time in (21). Moreover, for a given probability, the global convergence time is calculated in (22).
For discussion (Section 8), we point out the algorithm####^~^~^~^~^~^####x2019;s ability to facilitate the satisfaction of severe timing requirements for DynWANs. Moreover, the analysis conclusions explain that when allowing merely a small fraction of the bandwidth to be spent on frame control information and when considering any given probability to converge within a bounded time, the proposed algorithm demonstrates a low dependency degree on the number of nodes in the network (as depicted by Figures 2 and 3).
We note that some of the proof details appear in the Appendix for the sake of presentation simplicity.
The system consists of a set, , of anonymous communicating entities, which we call nodes. Denote every node with a unique index, .
Each node has fine-grained, real-time clock hardware. We assume that the MAC protocol is invoked periodically by synchronous (common) pulse that aligns the starting time of the TDMA frame. This can be based, for example, on TDMA alignment algorithms , GPS , or a distributed pulse synchronization algorithm . The term (broadcasting) timeslot refers to the period between two consecutive common pulses, and , such that , where is a predefined constant named the frame size. Throughout the paper, we assume that . In our pseudocode, we use the event timeslot that is triggered by the common pulse. We assume that the timeslots are aligned as well.
2.2. Communications and Interferences
At any instance of time, the ability of any pair of nodes to communicate is defined by the set, , of (direct) neighbors that node can communicate with directly. Wireless transmissions are subject to interferences (collisions). We consider the potential of the nodes to interfere with each other####^~^~^~^~^~^####x2019;s communications. The interference model in this paper is based on discrete graphs.
The set is the set of nodes that may interfere with ####^~^~^~^~^~^####x2019;s communications when any nonempty subset of them, , transmits concurrently with . We call the (extended) neighborhood of node , and is named the (extended) degree of node . We assume that at any time, for any pair of nodes, ; it holds that implies that . Given a particular instance of time, we define the (interference) graph as , where represents the interference relationships among nodes.
2.3. Communication Schemes
We consider (basic technology of) radio units that raise the event when they detect that the received energy levels have reached a threshold in which the radio unit is expected to succeed in carrier locking; see . Timeslots allow the transmission of packets using the primitives of and after fetching () a new packet from the upper layer, and respectively, before delivering () the packet to the upper layer. A beacon is a short packet that includes no data load, rather the timing of the event is the delivered information . We assume that every node that invokes the operation causes the event to be raised by its neighbors, , within the exposure time, . Before the transmission of the packet in timeslot , our communication scheme uses beacons for signaling the node####^~^~^~^~^~^####x2019;s intention to transmit a packet within ; see Figure 1.
2.4. System Settings
We consider the interleaving model . Every node, , executes a program that is a sequence of atomic steps. The state of a node consists of the value of all the variables of the node (including messages in transit for ). Variables are associated with individual node states by using the subscript notation, that is, is the value of variable in ####^~^~^~^~^~^####x2019;s state. The term configuration is used for a tuple of the form , where is the (interference) graph, and are the nodes####^~^~^~^~^~^####x2019; states (including the set of all incoming communications). An execution (run) is an unbounded sequence of system configurations , such that each configuration (except the initial configuration ) is obtained from the preceding configuration by the execution of steps, , taken by all nodes.
Let (task) be a specification (predicate) set and a set of all executions that satisfy task . Let us consider TDMA-based MAC protocols for which the task requires that every node has its own broadcasting timeslot that is unique within its neighborhood. We note that ####^~^~^~^~^~^####x2019;s requirements are obviously satisfiable when the ratio between the extended degree and the frame size is less than one; that is, there is no timeslot exhaustion when for all . Therefore, the studied task also deals with timeslot exhaustion by delivering busy channel indications, , to the nodes for which there were no timeslot left. We define to be the set of legal executions, , for which holds in all of ####^~^~^~^~^~^####x2019;s configurations.
We say that configuration is safe if there is an execution , such that is ####^~^~^~^~^~^####x2019;s starting configuration. Let be an execution and its arbitrary starting configuration. We say that ####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;converges with respect to if within a bounded number of steps from , the system reaches a safe configuration . The closure property requires that , for any execution, , that starts form . An algorithm is said to be self-stabilizing if it satisfies both the convergence and the closure properties.
We describe execution as an unbounded number of concatenated finite sequences of configurations. The finite sequence, , , is a broadcasting round if (1) configuration has a clock value, , of and immediately follows a configuration in which the clock value is , and (2) configuration has a clock value of and immediately precedes a configuration in which the clock value is .
3. Algorithm Description
The proposed MAC algorithm periodically performs clear channel assessments. It uses these assessments when informing each node about the nearby unused timeslots. The nodes use this information for selecting their broadcasting timeslots, assessing the success of their broadcasts and reselecting timeslots when needed.
The MAC algorithm in Algorithm 1 satisfies the task. During the convergence period, several nodes can be assigned to the same timeslot. Namely, we may have . The algorithm solves such timeslot allocation conflicts by letting the nodes and go through a (listening/signaling) competition before transmitting in its broadcasting timeslot. The competition rules require each node to choose one out of listening/signaling periods for its broadcasting timeslot; see Figure 1. This implies that among all the nodes that attempt to broadcast in the same timeslot, the ones that select the earliest listening/signaling period win this broadcasting timeslot and access the communication media. Before the winners access their timeslots, they signal to their neighbors that they won via beacon transmission. The signal is sent during their choice of listening/signaling periods; see Figure 1. When a node receives a beacon, it does not transmit during that timeslot, because it lost this (listening/signaling) competition. Instead, it randomly selects another broadcasting timeslot and competes for it on the next broadcasting round.
In detail, the MAC algorithm in Algorithm 1 is invoked at the start of every timeslot, . When is the first timeslot, the algorithm tries to allocate the broadcasting timeslot, , to (line 11) by randomly selecting a timeslot for which there is no indication to be used by its neighbors. Later, when the timeslot becomes ####^~^~^~^~^~^####x2019;s broadcasting timeslot, , the node attempts to broadcast (by calling the function in line 13). We note that the start of timeslot also requires the marking of as an unused timeslot and the removal of stale information (line 12). This indication is changed when the event is raised (line 27) due to a neighbor transmission; namely, when the detected energy levels reach a threshold in which the radio unit is expected to succeed in carrier locking; see .
When a node attempts to broadcast, it uses the (listening/signaling) competition mechanism for deciding when to signal to its neighbors that it is about to transmit a packet. The competition has rounds, and it stops as soon as the node transmits a beacon or a neighbor succeeds in signaling earlier (lines 18 to 23). We note that this signaling is handled by the event (line 27). Moreover, beacons are not required to carry payloads or any other information that is normally stored in packet headers. They are rather used to invoke the carrier sense event in .
The carrier sense in timeslot indicates to each node that it needs to defer from transmission during (line 25). In particular, it should stop using timeslot for broadcasting, stop competing, and mark as a used timeslot. Lastly, arriving DATA packets are delivered to the upper layer (line 15).
4. Correctness Proof: Outline and Notation
The proof starts by considering networks that do not change their topology and for which the ratio between the extended node degree and the frame size is less than one, that is, for all . (We deal with cases in which for all does not hold in Section 8). For these settings, we show that the MAC algorithm in Algorithm 1 is self-stabilizing with respect to task (Appendicies A to B), before considering the convergence time within a single neighborhood (Section 5) and the entire neighborhood (Section 6). These convergence estimations facilitate the exploration of important properties, such as predictability, and dealing with changes in the network topology of DynWANs (Section 8).
The exposition of the proof outline refers to Definition 1, which delineates the different states at which a node can be in relation to its neighbors. Definition 1 groups these states into three categories of relative states: (1)####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009; to be allocated, when the node state depicts correctly its neighbor states, (2)####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009; a timeslot, when the node is competing for one, but there is no agreement with its neighbor states, and (3)####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009; to a timeslot, when the node is the only one to be allocated to a particular timeslot in its neighborhood. The correctness proof shows that the MAC algorithm in Algorithm 1 implements in a self-stabilizing manner by showing that eventually all nodes are allocated with timeslots; that is, all nodes are in the relative state ; see Definition 1.
Let be an execution of the MAC algorithm in Algorithm 1 and the th complete broadcasting round of , where is an integer. We simplify the presentation by using uppercase notation for the configurations, , where is a timeslot. This notation includes the of the first event to be triggered immediately after configuration , that is, .
Definition 1. We say that node is (to be allocated) to a timeslot in configuration , if properties (1), (2), and (3) hold for node , but Property (4) does not. We say that is timeslot in configuration , if properties (1) to (4) hold for node , but Property (5) does not. We say that node is in state, with respect to timeslot in configuration , if properties (1) to (5) hold for node as follows:
Property (1) implies that node finishes any broadcast attempts within a timeslot. Properties (2) to (3) consider the case in which ####^~^~^~^~^~^####x2019;s internal state represents correctly the timeslot allocation in its neighborhood. In particular, property (2) means that processor views timeslot as an unused one if, and only if, it is indeed unused. Property (3) implies that when node is not using any timeslot, there is an unused timeslot at its disposal. Property (4) says that node is using timeslot . Property (5) refers to situations in which ####^~^~^~^~^~^####x2019;s neighbors are not using ####^~^~^~^~^~^####x2019;s timeslot during the next broadcasting round.
Starting from an arbitrary configuration, we show that node becomes Ready within two broadcasting rounds (or one complete broadcasting round); see Appendix A. Then, we consider the probability, , that a node enters the relative state from either or ; see (6) (and Appendices B and D). Namely, (6) considers the probability that node is the only one to use its broadcasting timeslot in its neighborhood, where is ####^~^~^~^~^~^####x2019;s probability to select the th listening/signaling period for transmitting its beacon.
Theorem 2 demonstrates self-stabilization.
Bounding the convergence time. We bound the time it takes the MAC algorithm in Algorithm 1 to converge by considering the relative states, , , and and describe a state machine of a Markovian process. This process is used for bounding the convergence time of a single node (Section 5) and the entire network (Section 6).
In detail, given node , its neighborhood , we define a random environment of a Markov chain; see Box 1. By looking at this random environment, we can focus our analysis on ####^~^~^~^~^~^####x2019;s relative states while avoiding probability dependencies and considering average probabilities . Suppose that ####^~^~^~^~^~^####x2019;s environment, , is known. Theorem 3 estimates two bounds on the expectation of probability , which is literally the probability , given that the environment is .
In order to do that, we consider a set, , of executions of the MAC algorithm, such that each execution starts in a configuration, , in which (I) for any node , properties (1), (2), and (3) hold, and (II) node is in the relative state , which implies that (III) eventually, node arrives to the relative state .
With this convention, we can add a probability 1 to transit from the relative state to ; see the dashed line in the state machine diagram of Box 1. This allows us to estimate the expected time to reach the final relative state from relative state by the expectation of the first hitting time of the irreducible Markov chain .
When computing the expected time for node to reach state within its neighborhood, we see that it is sufficient to consider the lower bound of the probability to obtain an upper bound on the expected time to convergence; see Section 5. Moreover, when considering the network convergence time, that is, the expected convergence time of all nodes in the network, we see that the most dominant parameter is the mean neighborhood size. We do that by applying the arithmetic mean versus geometric mean (AM-GM) inequality and bounding the expected network convergence time; see Section 6.
Throughout the paper, we denote the states of the Markov chain by , and is the expectation, given that we start in relative state , . In this paper, the states , , and of the Markovian process correspond, respectively, to states , , and and the time corresponds to configuration , where is the first complete broadcasting round in that starts in a configuration, , in which all nodes are in the relative state Ready. For example, is the expected time to reach the state.
Let be a node for which in configuration . We define to be the set of ####^~^~^~^~^~^####x2019;s (broadcasting timeslot) matching neighbors, which includes all of ####^~^~^~^~^~^####x2019;s neighbors that, during broadcasting round , are attempting to broadcast in ####^~^~^~^~^~^####x2019;s timeslot. In our proofs, we use as the number of listening/signaling periods, .
5. Convergence within a Neighborhood
Theorem 3 bounds the expected time, , for a node to reach the relative state , and follows from Proposition 5 and (12). Note that when the number of listening/signaling periods is and considering saturated situations in which the extended node degree is smaller than the TDMA frame size. Namely, the proposed algorithm convergence with a neighborhood is brief.
Theorem 3 (local convergence). The expected time, , for node to reach the relative state satisfies (7), where is the number of listening/signaling periods, is the TDMA frame size, and is ####^~^~^~^~^~^####x2019;s extended degree.
We look into the transition probability among relative states by depicting the diagram of Box 1 as a homogeneous Markov chain. We estimate the diagram transition probabilities in a way that maximizes the expected time for reaching the diagram####^~^~^~^~^~^####x2019;s final state, . It is known that the first hitting time is given by , where is the invariant probability vector . Let be the expected time it takes node that starts at the relative state to reach . It is clear that , because is the return time of the relative state . In our case, the transition matrix is given by the following:
The invariant probability vector satisfying is given by
The estimation of the maximal expected time necessary to assign the node to a timeslot requires us to compute bounds on the probabilities , , and that maximize as follows
The expected time for to reach the relative state is bounded in
Lemma 4. Suppose that is the number of listening/signaling periods; see line 2 of the code in Algorithm 1. Then .
Proof. Let us consider node that is in relative state . Given that has neighbors that compete for the same timeslot, the probability that gets allocated, , is given by (13). Consider next that is in relative state , and thus, we know that transmitted during the preceding broadcasting round and transited from relative state to . Moreover, is using the same timeslot for the current broadcasting round. The only neighbors of that are using the same timeslot are the neighbors that are also in relative state and have chosen the same listening/signaling period as during the preceding broadcasting round. Let us denote by , the number of such neighbors. Given the probability that is allocated to the timeslot is given by We have that is stochastically dominated by , that is, . Indeed, is a random variable that counts the number of neighbors that choose the same timeslot as , while counts the number of neighbors that choose the same timeslot and listening/signaling period as . For , ####^~^~^~^~^~^####x2019;s expected value is smaller than ####^~^~^~^~^~^####x2019;s expected value. To conclude, we remark that expressions (13) and (14) are the same decreasing function, , that is evaluated at two different points, and , respectively. Moreover, since is stochastically dominated by , (15) holds as follows:
The first bound, ((7)), has a simple intuitive interpretation. Let us consider first that two nodes compete for a same timeslot. The two nodes choose independently any of the listening/signaling periods and there are different possible outcomes. Among these outcomes correspond to the situation where the two nodes choose the same listening/signaling period and there is no winner. We then have outcomes that lead to a winner. There is then a probability of that one of the nodes wins the (listening/signaling) competition. Since the game is symmetric, the probability that wins is . The fact that we have timeslots divides the number of competing nodes, , and implies that there are competing nodes for the same timeslot. If we interpret the game as a collection of independent games, where for each game wins with probability , thus, the probability that wins is . The inverse of this expression gives the average time for the event to occur and is the bound by (7).
6. Network Convergence
We estimate the expected time for the entire network to reach a safe configuration in which all nodes are allocated with timeslots. The estimation is based on the number of nodes that are the earliest to signal in their broadcasting timeslot. These nodes are winners of the (listening/signaling) competition and are allocated to their chosen timeslots. However, counting only these nodes leads to underestimating the number of allocated nodes, which then results in an overestimation of the convergence time. Indeed, node might have a neighbor that selects the earliest listening/signaling period in , but does not transmit because one of its neighbors, , had transmitted in an earlier listening/signaling period. Our bound considers only while both and transmit, became is inhibited by ####^~^~^~^~^~^####x2019;s beacon.
Lemma 6 shows that the assumption that the nodes are allocated independently of each other is suitable for bounding the network convergence time, . Theorem 7 uses Lemma 6 for bounding the network convergence time, .
In Section 5, we prove a bound on the expected time, , for a single node to be allocated to a timeslot. We observe that the bound depends uniquely on the number of listening/signaling periods, , as well as the ratio between the extended degree and the frame size, . In order to obtain a bound valid for all nodes, we bound this ratio with where is as defined in Lemma 6. We note that the time needed for the allocation of timeslots to all the nodes depends on , the total number of nodes.
In detail, the convergence time estimation considers the (fixed and independent) bound, , for the probability that a node reaches the relative state within a broadcasting round. Then, the convergence time, , is a random variable with geometric probability, that is, . Let us denotes the time it takes for the nodes to respectively reach the relative state . The convergence time, , for all the nodes is given with , which depends on .
Lemma 6. The expected number of nodes, , that win the (listening/signaling) competition after one broadcasting round satisfies (17), where , is the number of timeslots, the number of edges in the interference graph, , and the number of nodes that attempt to access the communication media.
Proof. The nodes that are allocated to a timeslot can previously be on relative state or . The probability of a transition from relative state to is , and a transition from relative state to is . As proved in Lemma 4, we always have . To bound the number of nodes that get allocated during a broadcasting round, we use the lower bound on the probability that a node gets allocated to a timeslot. Moreover, in the computations, we use the AM-GM bound , which says that if then and denote by the number of neighbors of node . As proved in Proposition D.1, since there are timeslots the number of neighbors of that choose the same timeslot as and compete for it is bounded by . This lemma is proved by (18), where the last line of the expression holds because .
We note that we use the AM-GM bound to reach the 4th row of (18).
By arguments similar to the ones used in the proof of Proposition 5, we deduce that if nodes compete, the expected number of nodes that get allocated to a timeslot is lower bounded as follows:
Theorem 7 bounds the system convergence time. We numerically validate Theorem 7; see Figure 2. Moreover, our experiments showed that the average convergence time of the network is below the upper bound of (21).
Theorem 7 (global convergence). The expected number of retransmissions is smaller than , where . Hence, one has that the expected number of broadcasting rounds, , that guarantee that all nodes reach the relative state satisfies
Moreover, given that there are nodes in the network and , the network convergence time is bounded by (22) with probability .
Consider This means that with probability , all nodes are allocated with timeslots in maximum broadcasting rounds; see Figure 3.
Proof. Theorem 3 bounds the convergence time of a particular processor; see (7). Lemma 6; see (20) , proves that this bound is still valid if we replace the term with ; that is, we consider the average degree instead of the particular degree of a node. If we replace by in expression (20) we obtain a larger bound because ; that is, .
The bound and the discussion in the paragraph of Section 6 show that the number of processors that are allocated during a broadcasting round is bounded by the random variable , where are identically and independently distributed random variables that are with probability and with probability (the second random variable dominates the first one; see ). This means that we lower bound the number of processors that are allocated if we consider that they are allocated independently with probability .
While the processors get allocated to a timeslot, the parameters and change because some timeslots are no longer available ( decreases, some nodes are allocated, decreases). Actually the ratio becomes , where because if a timeslot is allocated or sensed used by processor , then , the number of available timeslots decreases by and , the number of competing nodes, must decrease at least by one since there must be at least one processor that uses the busy timeslot (there may be multiple that are in state ). Under these circumstances, we always have . Thus, we can obtain a lower bound for the expected time to reach the relative state by assuming that all nodes are allocated independently with probability . We simplify the following arguments by using this definition of .
To bound the number of broadcasting rounds, we consider the following game. The bank pays 1 unit to the nodes that get in state (get allocated to a timeslot) and receives units per nodes that fail to get in state . The game is fair because in each round the expected gain is . If we denote by the number of processors that get in state during the th broadcasting round and by the number of processors that fail, we have that the gain is given by (23), where denotes the total number of rounds.
One has The expected gain is because the game is fair () and because eventually all the nodes get in state and the bank pays unit for each such processors. If we compute the expectation on both sides of (23), we then obtain We observe that is the expected total number of retransmissions and is the average expected number of retransmissions whose value is . Replacing with its expression, we obtain that the average number of retransmission is bounded by , and, this leads to the bound (21).
To prove the second assertion, let be the convergence time of nodes , respectively. The random variables, , are bound by random variables with geometric random distribution with expectation of , with . We require that in order to ensure that all nodes are allocated with timeslots. The fact that the random variables, , are independent and identically distributed, implies (25), where is a random geometrical random variable, that is, and .
Consider Which satisfies (26) with probability ?
One has By solving (26), we observe that (26) is satisfied for any , where satisfies (22). This proves that, with probability , the network convergence time is bounded by (22).
Existing MAC protocols offer mechanisms for dealing with contention (timeslot exhaustion) via policies for administering message priority, such as . In particular, the IEEE 802.11p standard considers four priorities and techniques for facilitating their policy implementation. We explain similar techniques that can facilitate the needed mechanisms.
7.1. Prioritized Listening/Signaling Periods
We partition the sequence of listening periods, , into subsequences, , where is used only for the th priority. For example, suppose that there are six listening/signaling periods and that nodes with the highest priority may use the first three listening/signaling periods, , and nodes with the lowest priority may use the last three, . In the case of two neighbors with different listening period parameters, say, and , that attempt to acquire the same broadcasting timeslot, the highest priority node always attempts to broadcast before the lowest priority one.
7.2. TDMA-Based Backoff
Let us consider two backoff parameters, and , that refer to the maximal and minimal values of the contention window. Before selecting an unused timeslot, the procedure counts a random number of unused ones. Algorithm 2 presents an implementation of the function that facilitates backoff strategies as an alternative to the implementation presented in line 29 of Algorithm 1.
The statically allocated variable records the number of backoff steps that node takes until it reaches the zero value. Whenever the function is invoked with , node assigns to a random integer from (cf. line 7). Whenever the value of is not greater than the number of unused timeslots, the returned timeslot is selected uniformly at random (cf. lines 8 to 9). Otherwise, a -value is returned after deducting the number of unused timeslots during the previous broadcasting round (cf. lines 6 and 10).
Thus far, both schedule-based and nonschedule-based MAC algorithms could not consider timing requirements within a provably short recovery period that follows (arbitrary) transient faults and network topology changes. This work proposes the first self-stabilizing TDMA algorithm for DynWANs that has a provably short convergence period. Thus, the proposed algorithm possesses a greater predictability degree, whilst maintaining low communication delays and high throughput.
In this discussion, we would like to point out the algorithm####^~^~^~^~^~^####x2019;s ability to facilitate the satisfaction of severe timing requirements for DynWANs by numerically validating Theorem 7. As a case study, we show that, for the considered settings of Figure 2, the global convergence time is brief and definitive. Figure 3 shows that when allowing merely a small fraction of the bandwidth to be spent on frame control information, say, three listening/signaling periods, and when considering 99####^~^~^~^~^~^####x25; probability to convergence within a couple of dozen TDMA frames, the proposed algorithm demonstrates a low dependency degree on the number of nodes in the network even when considering 10,000 nodes.
We have implemented the proposed algorithm, extensively validated our analysis via computer simulation, and tested it on a platform with more than two dozen nodes . These results indeed validate that the proposed algorithm can indeed facilitate the implementation of MAC protocols that guarantee satisfying these severe timing requirements.
The costs associated with predictable communications, say, using cellular base stations, motivate the adoption of new networking technologies, such as MANETs and VANETs. In the context of these technologies, we expect that the proposed algorithm will contribute to the development of MAC protocols with a higher predictability degree.
Propositions A.1, A.2 and A.3 imply that properties (1), (2), and, respectively, (3) hold within two broadcasting rounds (or one complete broadcasting round). Let be an execution of the MAC algorithm in Algorithm 1, an integer, and the first configuration in a complete broadcasting round . We note that follows an arbitrary starting configuration.
Proposition A.1. In , it holds that .
Proof. The value of is updated in line 18 (assigned to ) and in lines 12, 20, and 27 (assigned to ). Let us look into these assignments.
In every timeslot, the value is assigned to (cf. line 12). Suppose that the function is called, and thus, is assigned to (line 18). We propose that before returning from the function and after is assigned to (line 18), node must assign to either in line 20 or 27. To see that, let us look at lines 18 and 19. Eventually either (because of an assignment in line 27) or (line 19) holds (note the condition when ). The latter case implies the execution of line 20.
Proposition A.2. in .
Proof. Recall that (see line 6) and that the proposition statement does not consider the cases in which: (because ) in , or There exists a configuration , such that in and in (because by ####^~^~^~^~^~^####x2019;s definition, is never in ).
We note that in every broadcasting round, node ####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;at most once Allocates the broadcasting timeslot (when ; see line 11), transmits a packet (when ; see line 13), and deallocates the broadcasting timeslot (by assigning to when and the event is raised; see line 26). Moreover, node updates only in lines 12 () and 27 (), when removes stale information just before timeslot , and respectively, when the event is raised.
Line 12 is executed at the start of every timeslot, whereas line 27 is executed after and only when the event is raised. The event is raised after and only when the node transmits in timeslot . In other words, none of ####^~^~^~^~^~^####x2019;s neighbors, , that transmits in timeslot , can avoid causing the event to be raised, and timeslot to be included in .
Proposition A.3. holds in .
Proof. If in , we are done. Let us suppose that in and show that in .
Let us assume, in the way of proof by contradiction, that, and show that , that is, a contradiction with the assumption that for all .
Recall that ####^~^~^~^~^~^####x2286;####^~^~^~^~^~^####x2009; (see line 6). Therefore, the assumption that implies that , because by ####^~^~^~^~^~^####x2019;s definition, is never in .
By Proposition A.2, we can say that . Since , we can write . By the fact that , we have that . Since (by definition), we have that , which implies : a contradiction with the assumption that .
Appendix A shows that, starting from an arbitrary configuration, node enters the relative state within two broadcasting rounds. This section considers the probability for to enter the relative states and .
Let and be an execution of the MAC algorithm in Algorithm 1. Suppose that is the first configuration in a complete broadcasting round for which properties (1) to (3) hold in configuration with respect to node ; that is, is in relative state , or . Propositions B.1, B.2 and B.3 show that there is a nonzero probability that node enters the relative state from either or in configuration .
Proposition B.1 shows that attempts to broadcast once in every round.
Proposition B.1. During broadcasting round , executes line 13 and calls the function .
Proof. If in , we are done by lines 11 and 13. Let us consider the case of in . By Property (4), , and thus, when line 11 is executed, the function returns a non- element from and when executing line 13.
Let be the probability for to transmit in the th listening/signaling period of timeslot (cf. line 19). This paper considers the concrete transmission probability . We motivate our implementation choice of the transmission probability, , in Box 2. Note that the sequential selection of the broadcasting rounds with probability leads to the uniform selection .
Proposition B.2 considers ####^~^~^~^~^~^####x2019;s chances to be the only one to transmit in its neighborhood.
Proposition B.2. There is a nonzero probability, (cf. (B.1)), that only node transmits in its broadcasting timeslot, , of broadcasting round .
Proof. We show that there is a nonzero probability that only node transmits in its broadcasting timeslot, , of broadcasting round . Let us look at and the nodes in while they attempt to broadcast in the steps and . All of these steps include the execution of line 19; namely, each node chooses to transmit in listening/signaling period with probability . Therefore, for any , there is a nonzero probability, , that, during timeslot , node transmits in the listening/signaling period and no node in transmits in round (or in an earlier one).
We note that the fact that transmits first during timeslot implies that it is the only one to transmit during . This is because once transmits a beacon in step (which includes the execution of line 21), node raises the event immediately after . Thus, we have that immediately after step , node takes step , which includes the execution of lines 26 and 27 that assign to and to . Thus, leaves the (listening/signaling) competition for timeslot (see line 18) and does not transmit its packet (see line 23).
We now turn to calculate . Let the variable denote the number of nodes that select the same timeslot as in configuration . The value of depends on the value of , and we denote this dependence with the notation (conditional probability). It means the value of depends on the value of . The value of for is . For the case of , 's value is given by (B.1) (that appears again next), where is the probability for transmitting in the th listening/signaling period.
We note that the th term in (B.1) is the probability that node selects the th listening/signaling period and all its neighbors select a later listening/signaling period.
Proposition B.3 shows that once a node is the only one in its neighborhood to transmit during its broadcasting timeslot, it enters the relative state .
Proposition B.3. (or having none of the nodes in transmitting during timeslot ) implies that node is in the relative state in .
Proof. We need to show that, in####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;, we have that and .
Showing That ####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;in . The proposition assumes that in . We wish to show that in , which implies that holds in and throughout .
Since the variable is assigned only in lines 11 (when ) and 26 (when ), it is sufficient to show that line 26 is not executed by any step during timeslot of broadcasting round , that is, .
Node raises the event only during timeslots in which ####^~^~^~^~^~^####x2019;s neighbor, , transmits. By the proposition assumptions that, during timeslot of broadcasting round , none of ####^~^~^~^~^~^####x2019;s neighbors transmits, we have . Moreover, does not include an execution of line 11 that changes the value of , because in .
Showing That for All ####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;in . The proposition assumes that for all ####^~^~^~^~^~^####x2009;####^~^~^~^~^~^####x2009;in . We wish to show that the same holds in . Since the variable is assigned to a non- value only in line 11 when , it is sufficient to show that when line 11 is executed in step the function considers a set that does not include ####^~^~^~^~^~^####x2019;s timeslot, . This is implied by the facts that for all (Claim 10.1) and (first item of (II) of this proof) in .
C. Theorem 2
Theorem 2 shows that all nodes are allocated eventually with timeslots (convergence) and once all nodes are allocated, they stay this way (closure).
Proof. After the previous proof of propositions, we can demonstrate this theorem.(i)Convergence. We need to show that properties (1) to (5) eventually hold in configuration for a finite value of . Propositions A.1, A.2 and A.3 imply that properties (1), (2), and, respectively, (3) within two broadcasting round.Propositions B.1, B.2 and B.3 show that there is a nonzero probability that node enters the relative state from either or within one broadcasting round. Thus, by analyzing the expected time of the scheduler-luck games [4, 51], we have that has a finite value. Further analysis of appears in Theorems 3 and 7.(ii)Closure. Suppose that is a safe configuration and let be any node. By the assumption that , we have that is in the relative state ; that is, properties (1) to (5) hold for any node . We need to show that properties (1) to (5) hold in configuration .
Propositions A.1, A.2, and A.3 imply properties (1), (2), and respectively, (3) (within one complete broadcasting round).
Properties (4) to (5) are implied by Proposition B.3 and the fact that Properties (4) to (5) hold in , that is, .
Propositions 5 and D.2 bound ####^~^~^~^~^~^####x2019;s value, where is the th broadcasting round in execution of the MAC algorithm in Algorithm 1. We assume that properties (1) to (5) hold in the first configuration, , of . These bounds are obtained by computing the expectation of with respect to , where in and . The reason is that is a random variable, that is, , where the expectation is computed with respect to the random variable .
We note that all the terms in (B.1) are convex functions of . This means that by Jensen####^~^~^~^~^~^####x2019;s inequality, we obtain a lower bound of in (D.1) by evaluating the expression at ####^~^~^~^~^~^####x2019;s expectation, .
The expression on the right side of the inequality can be again lower bounded if we estimate an upper bound for . We proceed to the computations in the proof of Proposition D.2 after demonstrating Proposition D.1 which shows that is bounded by the ratio , which is rather intuitive but needs to be proved.
Proposition D.1. In configuration it holds that , where .
Proof. We show that by considering configuration . The maximal number of ####^~^~^~^~^~^####x2019;s neighbors that might choose the same timeslot as in configuration is , because any node, , that chooses a new broadcasting timeslot immediately before must have in configuration . We compute the expected value of in (D.2) as a function of the number of empty timeslots, , that selects from when choosing a new broadcasting timeslot, where in configuration .
Our assumption that implies that . Using that and, , we obtain the following:
Proposition D.2. One has
Proposition 5 considers the concrete transmission probability .
Proof. In this proof, we use the letter instead of for reason of space. We replace with in (6) to obtain (D.5).
Equation (D.6) is more compact than (D.5) and it is obtained by the fact that the function is convex.
Another way to bound (D.5) is by considering the decreasing function , as in the following:
The authors thank Thomas Petig and Oscar Morales for helping with improving the presentation. The work of Elad M. Schiller was partially supported by the EC, through project FP7-STREP-288195, KARYON (kernel-based architecture for safety-critical control). The proceeding and technical versions of this work appears in  and, respectively, .
- H. Hartenstein and K. Laberteaux, VANET: Vehicular Applications and Inter-Networking Technologies, Wiley, 2010.
- K. Bilstrup, E. Uhlemann, E. G. Ström, and U. Bilstrup, “Evaluation of the IEEE 802.11p MAC method for vehicle-to-cehicle communication,” in Proceedings of the 68th Semi-Annual IEEE Vehicular Technology (VTC '08), pp. 1–5, September 2008.
- K. Bilstrup, E. Uhlemann, E. G. Ström, and U. Bilstrup, “On the ability of the 802.11p MAC method and STDMA to support real-time vehicle-to-vehicle communication,” Eurasip Journal on Wireless Communications and Networking, vol. 2009, Article ID 902414, 2009.
- S. Dolev, Self-Stabilization, MIT Press, 2000.
- S. Dolev and T. Herman, “Superstabilizing protocols for dynamic distributed systems,” Chicago Journal of Theoretical Computer Science, 1997.
- N. Abramson, “Development of the ALOHANET,” IEEE Transactions on Information Theory, vol. 31, no. 2, pp. 119–123, 1985.
- W. G. Schmidt, “Satellite time-division multiple access systems: past, present and future,” Telecommunications, vol. 7, no. 8, pp. 21–24, 1973.
- M. Haenggi, “Outage, local throughput, and capacity of random wireless networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 8, pp. 4350–4359, 2009.
- P. Leone, M. Papatriantafilou, and E. Michael Schiller, “Relocation analysis of stabilizing MAC algorithms for large-scale mobile ad hoc networks,” in Proceedings of the 5th International Workshop on Algorithm Aspects of Wireless Sensor Networks (ALGOSENSORS '09), pp. 203–217, 2009.
- T. Herman and S. Tixeuil, “A distributed TDMA slot assignment algorithm for wireless sensor networks,” in Proceedings of the 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '04), vol. 3121 of Lecture Notes in Computer Science, pp. 45–58, Springer, 2004.
- W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the IEEE INFOCOM, pp. 1567–1576, June 2002.
- A. Cornejo and F. Kuhn, “Deploying wireless networks with beeps,” in Proceedings of the 24th International Symposium on Distributed Computing (DISC ’10), N. A. Lynch and A. A. Shvartsman, Eds., vol. 6343 of Lecture Notes in Computer Science, pp. 148–162, Springer, 2010.
- R. Rom and F. A. Tobagi, “Message-based priority functions in local multiaccess communication systems,” Computer Networks, vol. 5, no. 4, pp. 273–286, 1981.
- R. Scopigno and H. A. Cozzetti, “Mobile slotted Aloha for Vanets,” in Proceedings of the IEEE 70th Vehicular Technology Conference Fall (VTC '09), pp. 1–5, September 2009.
- F. Yu and S. Biswas, “Self-configuring TDMA protocols for enhancing vehicle safety with DSRC based vehicle-to-vehicle communications,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, pp. 1526–1537, 2007.
- S. Viqar and J. L. Welch, “Deterministic collision free communication despite continuous motion,” in Proceedings of the 5th International Workshop on Algorithm Aspects of Wireless Sensor Networks (ALGOSENSORS '09), pp. 218–229, 2009.
- R. Scopigno and H. A. Cozzetti, “GNSS synchronization in Vanets,” in Proceedings of the 3rd International Conference on New Technologies, Mobility and Security (NTMS '09), pp. 1–5, December 2009.
- M. Mustafa, M. Papatriantafilou, E. Michael Schiller, A. Tohidi, and P. Tsigas, “Autonomous TDMA alignment for VANETs,” in Proceedings of the IEEE 76th Vehicular Technology Conference (VTC ’12), 2012.
- A. Daliot, D. Dolev, and H. Parnas, “Self-stabilizing pulse synchronization inspired by biological pacemaker networks,” in Proceedings of the 6th International Symposium on Self-Stabilizing Systems (SSS '03), S.-T. Huang and T. Herman, Eds., vol. 2704 of Lecture Notes in Computer Science, pp. 32–48, Springer, 2003.
- Y. Tadokoro, K. Ito, J. Imai, N. Suzuki, and N. Itoh, “Advanced transmission cycle control scheme for autonomous decentralized TDMA protocol in safe driving support systems,” in Proceedings of the IEEE Intelligent Vehicles Symposium, pp. 1062–1067, June 2008.
- H. A. Cozzetti and R. Scopigno, “RR-Aloha+: a slotted and distributed MAC protocol for vehicular communications,” in Proceedings of the IEEE Vehicular Networking Conference (VNC '09), pp. 1–8, October 2009.
- M. Lenoble, K. Ito, Y. Tadokoro, M. Takanashi, and K. Sanda, “Header reduction to increase the throughput in decentralized TDMA-based vehicular networks,” in Proceedings of the IEEE Vehicular Networking Conference (VNC '09), pp. 1–4, October 2009.
- R. Scopigno and H. A. Cozzetti, “Evaluation of time-space efficiency in CSMA/CA and slotted vanets,” in Proceedings of the IEEE 72nd Vehicular Technology Conference Fall (VTC '10), pp. 1–5, September 2010.
- F. Abrate, A. Vesco, and R. Scopigno, “An analytical packet error rate model for WAVE receivers,” in Proceedings of the IEEE 74th Vehicular Technology Conference (VTC '11), pp. 1–5, September 2011.
- H. A. Cozzetti, R. M. Scopigno, L. Casone, and G. Barba, “Comparative analysis of IEEE 802.11p and MS-aloha in vanet scenarios,” in Proceedings of the IEEE Asia-Pacific Services Computing Conference (APSCC '09), pp. 64–69, December 2009.
- M. Demirbas and M. Hussain, “A MAC layer protocol for priority-based reliable multicast in wireless ad hoc networks,” in Proceedings of the 3rd International Conference on Broadband Communications, Networks and Systems (BROADNETS '06), October 2006.
- J. R. S. Blair and F. Manne, “An efficient self-stabilizing distance-2 coloring algorithm,” in Proceedings of the SIROCCO, S. Kutten and J. Zerovnik, Eds., vol. 5869 of Lecture Notes in Computer Science, pp. 237–251, Springer, 2009.
- S. Gollakota and D. Katabi, “Zigzag decoding: combating hidden terminals in wireless networks,” in Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM '08), V. Bahl, D. Wetherall, S. Savage, and I. Stoica, Eds., pp. 159–170, August 2008.
- F. Kuhn, N. A. Lynch, and C. C. Newport, “The abstract MAC layer,” in Proceedings of the 23rd International Symposium on Distributed Computing (DISC '09), I. Keidar, Ed., vol. 5805 of Lecture Notes in Computer Science, pp. 48–62, Springer, 2009.
- M. M. Halldórsson and R. Wattenhofer, “Wireless communication is in APX,” in Proceedings of the ICALP, S. Albers, A. Marchetti-Spaccamela, Y. Matias, S. E. Nikoletseas, and W. Thomas, Eds., vol. 5555 of Lecture Notes in Computer Science, pp. 525–536, Springer, 2009.
- O. Goussevskaia, R. Wattenhofer, M. M. Halldórsson, and E. Welzl, “Capacity of arbitrary wireless networks,” in Proceedings of the INFOCOM, pp. 1872–1880, IEEE, 2009.
- R. Wattenhofer, “Theory meets practice, it’s about time!,” in Proceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM '10), Špindlerův Mlýn, Czech Republic, January 2010.
- C. Lenzen, T. Locher, P. Sommer, and R. Wattenhofer, “Clock synchronization: open problems in theory and practice,” in Proceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM '10), Špindlerův Mlýn, Czech Republic, January 2010.
- J. Schneider and R. Wattenhofer, “Coloring unstructured wireless multi-hop networks,” in Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC '09), S. Tirthapura and L. Alvisi, Eds., pp. 210–219, August 2009.
- A. Jhumka and S. S. Kulkarni, “On the design of mobility-tolerant TDMA-based media access control (MAC) protocol for mobile sensor networks,” in Proceedings of the ICDCIT, T. Janowski and H. Mohanty, Eds., vol. 4882 of Lecture Notes in Computer Science, pp. 42–53, Springer, 2007.
- C. Lenzen, J. Suomela, and R. Wattenhofer, “Local algorithms: self-stabilization on speed,” in Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS '09), R. Guerraoui and F. Petit, Eds., vol. 5873 of Lecture Notes in Computer Science, pp. 17–34, Springer, 2009.
- A. Lagemann, J. Nolte, C. Weyer, and V. Turau, “Mission statement: applying self-stabilization to wireless sensor networks,” in Proceedings of the 8th GI/ITG KuVS Fachgespräch “Drahtlose Sensornetze” (FGSN '09), pp. 47–49, August 2009.
- M. Arumugam and S. S. Kulkarni, “Self-stabilizing deterministic TDMA for sensor networks,” in Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT '05), G. Chakraborty, Ed., vol. 3816 of Lecture Notes in Computer Science, pp. 69–81, Springer, 2005.
- M. Arumugam and S. S. Kulkarni, “Self-stabilizing deterministic time division multiple access for sensor networks,” Journal of Aerospace Computing, Information and Communication, vol. 3, no. 8, pp. 403–419, 2006.
- S. S. Kulkarni and M. Arumugam, “Infuse: a TDMA based data dissemination protocol for sensor networks,” International Journal of Distributed Sensor Networks, vol. 2, no. 1, pp. 55–78, 2006.
- P. Leone, M. Papatriantafilou, E. Michael S, and G. Zhu, “Analyzing protocols for media access control in large-scale mobile ad hoc networks,” in Proceedings of the Workshop on Self-Organising Wireless Sensor and Communication Networks (Somsed '09), Hamburg, Germany, October 2009.
- P. Leone, M. Papatriantafilou, E. Michael Schiller, and G. Zhu, “Chameleon-mac: adaptive and self-? algorithms for media access control in mobile ad hoc networks,” in Proceedings of the12th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS ’10), S. Dolev, J. Arturo Cobb, M. J. Fischer, and M. and Yung, Eds., vol. 6366 of Lecture Notes in Computer Science, pp. 468–488, Springer, 2010.
- D. Aldous and J. Fill, “Reversible markov chain and random walks on graph,” 1999, http://www.stat.berkeley.edu/~aldous/RWG/book.html.
- B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System. Theory and Practice, Springer, 1993.
- K. Jamieson, B. Hull, A. Miu, and H. Balakrishnan, “Understanding the real-world performance of carrier sense,” in Proceedings of the ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND '05), pp. 52–57, August 2005.
- R. Cogburn, “The ergodic theory of Markov chains in random environments,” Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete, vol. 66, no. 1, pp. 109–128, 1984.
- S. M. Ross, Stochastic Processes, John Wiley & Sons, 1996.
- J. M. Steele, The Cauchy-Schwartz Master Class, Cambridge University Press,, 2004.
- T. Lindvall, Lectures on the Coupling Method, Dover Publications, 1992.
- A. M. Crocker, W. L. Godson, and C. M. Penner, “Frontal contour charts,” Journal of the Atmospheric Sciences, vol. 4, no. 3, 1947.
- S. Dolev, A. Israeli, and S. Moran, “Analyzing expected time by scheduler-luck games,” IEEE Transactions on Software Engineering, vol. 21, no. 5, pp. 429–439, 1995.
- J. L. W. V. Jensen, “Sur les fonctions convexes et les inégalités entre les valeurs moyennes,” Acta Mathematica, vol. 30, no. 1, pp. 175–193, 1906.
- P. Leone and E. Michael Schiller, “Self-stabilizing tdma algorithms for dynamic wireless ad-hoc networks,” in Proceedings of the ALGOSENSORS, A. Bar-Noy and M. M. Halldórsson, Eds., Lecture Notes in Computer Science, Springer, 2012.
- P. Leone and E. M. Schiller, “Self-stabilizing TDMA algorithms for dynamic wireless ad-hoc networks,” abs 1210.3061, submitted in CoRR, 2012, http://arxiv.org/abs/1210.3061.