首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 500 毫秒
1.
It is widely believed that IEEE 802.11 standard is aimed mainly for fixed indoor wireless local area networks and is not suited for mobile applications, even though the IEEE 802.11b systems may work in either infrastructure mode or ad hoc mode. The impact of node mobility on ad hoc network performance has already been studied intensively, but these studies mostly do not consider temporal fluctuations of the mobile wireless channel due to the Doppler shift. An investigation of the mobility impact on the performance of IEEE 802.11b ad hoc systems with Rician/Rayleigh fading under different node velocities is presented. A comprehensive and in-depth analysis of the impacts of a multitude of different signal distortions on an IEEE 802.11b system performance is also presented. Specifically, the authors study the bit-error rate performances with respect to node velocities for different modulation schemes. The simulation results show that, owing to its extremely low implementation and deployment cost, the current IEEE 802.11b standard has its potential to be deployed in a mobile ad hoc environment if the line-of-sight path between transmitter and receiver exists.  相似文献   

2.
The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more vulnerable to security attacks. However, providing a security mechanism implicitly has been a major challenge in such an ad-hoc environment. Certificate management plays an important role in securing an ad-hoc network. Certificate assignment, verification, and revocation complexity associated with the Public Key Infrastructure (PKI) framework is significantly large. Smaller the size of the network lesser will be the certificate management complexity. However, smaller the size, large will be the overall infrastructural cost, and also larger will be the overall redundant certificates due to multiple certificate assignment at the boundary regions, that in turn affects the prompt and accurate certificate revocation. By taking these conflicting requirements into consideration, we propose the trust-based hexagonal clustering for an efficient certificate management (THCM) scheme, to bear an absolutely protected MANET Disparate to the existing clustering techniques, we present a hexagonal geographic clustering model with Voronoi technique where trust is accomplished. In particular, to compete against attackers, we initiate a certificate management strategy in which certificate assignment, verification, and revocation are carried out efficiently. The performance of THCM is evaluated by both simulation and empirical analysis in terms of effectiveness of revocation scheme (with respect to revocation rate and time), security, and communication cost. Besides, we conduct a mathematical analysis of measuring the parameters obtained from the two platforms in multiple times. Relevant results demonstrate that our design is efficient to guarantee a secured mobile ad hoc network.  相似文献   

3.
Two-terminal reliability analyses for a mobile ad hoc wireless network   总被引:2,自引:2,他引:0  
Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity.  相似文献   

4.
A mobile ad hoc network (MANET) is a wireless, dynamic, infrastructure-less, self-organized, multi-hop, and decentralized network. Each node in MANET can act as a router as well as a work station. Many routing protocols have been developed to increase the efficiency of MANET. The primary objective of this paper is a detailed QoS comparison of reactive (AODV), proactive (DSDV), and hybrid (ZRP) routing protocols of MANET in order to find which routing protocol works best in a particular network scenario. The analysis was made for TCP-based traffic patterns. The performance differentials were analyzed on the basis of normalized routing overhead, packet loss, packet delivery ratio, control packets, end-to-end delay, packet received, and packet sent with a variation of nodes density and mobility. The results were obtained using the NS-2 simulator.  相似文献   

5.
一种新的基于移动预测的MANET路由协议   总被引:7,自引:0,他引:7  
移动自组网是一种由一系列可以自由移动的节点主机聚集而成的一个临时性动态网络。它没有固定基站,也没有作为控制管理中心的节点主机,由于其拓扑的动态性,其路由协议与其他传统网络有很大的区别。为了能更有效地移动自组网中实现数据的传送,本文提出了一种基于移动预测下的MANET路由协议,该协议综合考虑了传输路径的延时和稳定性,选择在延时限制下平均拥有最稳特性的传输路径,模拟结果表明,这种方法比基于移动预测量稳路径路由协议的传输时延要短,传送成功概率要高,而控制开销却相关不大。  相似文献   

6.
Model abstraction techniques have been widely used to accelerate simulations in the context of homogeneous wired networks. However, the application of these techniques to wireless networks is rare. The authors investigate how model abstraction techniques can be applied to simulations of mobile ad hoc networks (MANETS). The authors focus on the time-stepped (TS) simulation technique and its effect on simulation accuracy, analysing the simulation error introduced and providing a formal expression. This technique is implemented in a new simulator, session level simulator (SSIM), a TS session-level MANET simulator developed in the course of this research. The results of experiments conducted using SSIM show that the TS simulation can speedup MANET simulation and improve scalability by reducing the number of events and the simulation running time. Moreover, the study on simulation error illustrates that besides the length of the time step, parameters of mobility and traffic models also have great effect on simulation accuracy.  相似文献   

7.
Ding  S. 《Communications, IET》2009,3(5):752-763
In a mobile ad hoc network (MANET) with multiple Internet gateways, efficient management of mobile IP functionality supporting seamless data services is a major challenge. The inadequacy of existing mobile IP schemes applicable to MANETs motivated the search for more efficient gateway discovery/handoff schemes. A solution for mobile IP-based gateway discovery/handoff in dynamic source routing (DSR)-based MANET is formulated. Enhanced mobile IP protocol suitable for MANET environment, i.e. the mobile IP registration controller, is designed. In particular, one of the most significant contributions deals with the mobile IP handoff triggering mechanism which is adaptively assisted by the DSR route maintenance mechanism. Simulation results are provided to support the idea.  相似文献   

8.
Serious games have recently enticed many researchers due to their wide range of capabilities. A serious game is a mean of gaming for a serious job such as healthcare, education, and entertainment purposes. With the advancement in the Internet of Things, new research directions are paving the way in serious games. However, the internet connectivity of players in Internet-of-things-enabled serious games is a matter of concern and has been worth investigating. Different studies on topologies, frameworks, and architecture of communication technologies are conducted to integrate them with serious games on machine and network levels. However, the Internet of things, whose core requirement is the provision of connectivity on the application layer, has different challenges for more dynamic applications such as serious games. The performance of Internet-of-things-enabled serious games depends on the type of infrastructure (wired, wireless) network and Mobile Ad-hoc Network (MANET) and is subtly different from one type of network to another. This paper investigates the connectivity challenges in the Internet-of-things-enabled serious games using the mentioned infrastructure and identifies the core requirements for these games. It also aims to evaluate various parameters such as reliability, scalability, response time, to name a few, with varying infrastructure and network types. Results highlight the preliminary infrastructure finding and highlight the core setup for which the games are deployed. Moreover, this work will be a steppingstone for architecting the connectivity in serious games in a typical smart space with many infrastructures such as wired networks, wireless networks, and MANET.  相似文献   

9.
Awdeh  R.Y. 《Communications, IET》2007,1(6):1187-1194
Previous work has shown that TCP (transmission control protocol) Vegas outperforms the more widely deployed TCP Reno in both wired and wireless networks. It was also shown that when both TCP variants coexist on the same wired links, Reno dominates because of its more aggressive behaviour. This paper examines for the first time the compatibility between Reno and Vegas in wireless IEEE 802.11 ad hoc networks. It is shown that Vegas generally dominates in the heterogeneous Reno/Vegas network scenario; a startling result that is inconsistent with what is seen in wired networks. It is shown that the wireless ad hoc network environment does not reward the aggressive behaviour of Reno. On the other hand, Vegas, with its more accurate yet more conservative mechanisms, is able to capture most of the bandwidth. This is found to be true when using the on-demand routing protocols of dynamic source routing (DSR) or ad hoc on-demand distance vector (AODV): the failure of a node to reach a next-hop node because of media access control (MAC)-sublayer repeated collisions is reported to the routing protocol, which then declares a route error that impacts Reno in a more serious way than Vegas. When the table-driven routing protocol destination-sequenced distance vector (DSDV) is used, Reno and Vegas share the network bandwidth in a fairer manner. Generally, fairness in this environment can be improved by reducing the TCP maximum window size.  相似文献   

10.
Push-to-talk (PTT) is a walkie-talkie like service which performs an efficient and instant voice over Internet protocol (VoIP) communication in mobile ad hoc network especially for certain circumstances, such as battle field and earthquake or disaster relief. The authors have designed and implemented the PTT mechanism in ad hoc VoIP network. The PTT server and user agent combined with the pseudo session initiation protocol (SIP) server in the implementation provide the PTT service without standalone SIP server support. The authors also conduct the experimental measurements, in terms of delay and packet loss, in the test-bed to demonstrate the realisation of PTT service in ad hoc VoIP network.  相似文献   

11.
The paper presents a jamming-based MAC with dynamic priority adjustment (JMDPA) for multimedia services in wireless ad hoc networks. The proposed scheme differentiates multimedia traffic into classes with different priority levels. A mobile node is prioritised in frame transmissions by issuing a precalculated length of jamming noise: the one with the longest jamming length can win the frame transmission. The winner immediately broadcasts its current priority level (local priority) to update the global priorities of all the neighbouring nodes. The global priority is used as a contention baseline, which prevents any node with a local priority lower than the baseline from participating in the next contention. One of the innovative designs in the proposed scheme is right, in that the priority of a mobile node can be dynamically adjusted according to network conditions so that any possible starvation of low-priority traffic or any ineffective contention of high-priority traffic can be avoided. A multidimensional Markov model, together with the scalability analysis, is introduced to evaluate the performance of the proposed JMDPA. The analytical results provide very useful guidelines to tune the QoS parameters for supporting prioritised multimedia traffic in wireless ad hoc networks  相似文献   

12.
Mobile Ad hoc Network (MANET) nodes exchange information using the multi-hop wireless communications without the need for any pre-existing infrastructure. Routing protocols of MANET are designed with an assumption that the nodes will cooperate in routing process. To achieve high throughput and reliable communication, the nodes are expected to cooperate with each other. Routing protocol plays a crucial role in an effective communication between nodes and operates on the assumption that the nodes are fully cooperative. Due to the open structure and limited battery-based energy in MANET, some nodes may not cooperate correctly or behave maliciously and such kind of misbehavior impacts the fairness, reliability and efficiency in MANET. Previous work addressed the ways to overcome these kinds of node misbehaviors and attacks. Most of the existing works need time to analyse the neighbor traffic and decide whether a neighbor is behaving maliciously or not. Further, the existing credit-based detection mechanisms may mark a genuine idle node as a malicious node. This work addresses a simple Neighbor Credit Value based AODV (NCV-AODV) routing algorithm for the detection of selfish behavior which avoids such false detection. The proposed idea is implemented in Ad hoc On Demand Distance Vector (AODV) routing protocol and an extensive analysis on the performance of the proposed detection mechanism against the selfish behavior of some MANET nodes are conducted.  相似文献   

13.
Wireless sensor networks (WSNs) for structural health monitoring (SHM) applications can provide the data collection necessary for rapid structural assessment after an event such as a natural disaster puts the reliability of civil infrastructure in question. Technical challenges affecting deployment of such a network include ensuring power is maintained at the sensor nodes, reducing installation and maintenance costs, and automating the collection and analysis of data provided by a wireless sensor network. In this work, a new "mobile host" WSN paradigm is presented. This architecture utilizes nodes that are deployed without resident power. The associated sensors operate on a mechanical memory principle. A mobile host, such as a robot or unmanned aerial vehicle, is used on an as-needed basis to charge the node by wireless power delivery and subsequently retrieve the data by wireless interrogation. The mobile host may be guided in turn to any deployed node that requires interrogation. The contribution of this work is the first field demonstration of a mobile host wireless sensor network. The sensor node, referred to as THINNER, capable of collecting data wirelessly in the absence of electrical power was developed. A peak displacement sensor capable of interfacing with the THINNER sensor node was also designed and tested. A wireless energy delivery package capable of being carried by an airborne mobile host was developed. Finally, the system engineering required to implement the overall sensor network was carried out. The field demonstration took place on an out-of-service, full-scale bridge near Truth-or-Consequences, NM.  相似文献   

14.
Peer-to-peer (P2P) communications have attracted a great deal of attention from the network research community in recent years. However, due to the fundamental limitations of wireless environments, providing reliable data availability for P2P applications over wireless ad hoc networks is still a major challenge. To address the problem, a distributed and randomised scheme based on self-avoiding walks is proposed. The scheme concatenates disparate network layers, with the goal of recovering from routing failures that disrupt P2P data accessibility. In addition, a probabilistic approach is presented that explores the tradeoffs between several system parameters. Some new analysis tools, such as path coupling, are utilised which provide a better understanding of the system's operations. That the proposed concepts and techniques make a significant contribution to the design of effective and efficient P2P applications in wireless ad hoc networks is believed.  相似文献   

15.
A mobile ad hoc network (MANET) has abundant mobile nodes that are free to communicate independently in many locations. Many existing energy models address the inadequacy of resources based on Ad hoc On-demand Multipath Distance Vector and Optimized Link State Protocol (OLSP) routing protocols for MANET along with various parameters. The architecture of energy-efficient routing mechanisms is a challenging problem in a MANET. In this work, a novel energy-aware routing model is introduced for MANET comprising an ant colony optimization (ACO) enhanced approach to energy-efficient-optimized link state routing (named ACO–EEOLSR). Initially, the route discovery is progressed by means of neighbor estimation and also with the authentication of link stability. Parameters such as energy, distance, and hop count are employed as willingness nodes, where both the energy and distance are entrenched through the OLSP. Consequently, the hop count is applied via the ACO system that is beneficial for link stability. After the acceptance of an acknowledgement, the hop count is authorized for further performance analysis. This approach increases the Quality of Service and also uses less energy compared to other energy models. The accomplished simulation upshot depicts that the ACO–EEOLSR outperforms the EEOLSR scheme with respect to the performance metrics of energy consumption, packet delivery ratio, total remaining time, average network lifetime, and a variance of energy.  相似文献   

16.
The authors present a hybrid automatic repeat request technique using adaptive Reed-Solomon (RS) codes with packet erasure. This technique suits the transport layer in tactical mobile wireless networks with type I encryption, where encryption erasures the entire Internet protocol packet. The novelty of the presented technique is the multifaceted optimisation of Reed-Solomon codes at the transport layer for delivery assurance, speed of service (SoS) and network throughput. With this technique, the transport layer in tactical networks can meet the stringent requirements of quality of service imposed by the tactical network user, even under adverse conditions. These requirements define a high level of reliability (delivery assurance), a specific SoS and optimum use of the limited bandwidth (BW) of the wireless network, where the probability of packet erasure can be very high. The provided probabilistic analysis shows that focusing on network throughput alone will result in violating SoS and delivery assurance requirements. On the other hand, focusing on SoS and delivery assurance requirements can result in poor network throughput. The multifaceted optimisation technique, which utilises hybrid ARQ for message delivery, is described using a homogeneous Markov chain.  相似文献   

17.
Wu  Y. Yang  K. Shen  J. 《Communications, IET》2008,2(1):98-106
Integrated cellular networks (ICNs) are normally constructed by adding ad hoc overlay on cellular networks to solve the latter's flexibility and capacity expansion problems. In such networks, routing plays a critical role in finding a route to divert congested traffic from a congested cell to another less crowded cell. Much work has been conducted on routing protocols in ICNs, whereas no dedicated work has been found for an important aspect of routing, namely source selection. The process of a source selection can be an algorithm that is designed for selecting a proper pseudo- source to release its occupying channel to a blocked mobile user. Consequently, this pseudo-source diverts its ongoing call to another cell by using a free channel in a neighbour cell via a relaying route. Based on an introduction of a representative ICN infrastructure, three source selection algorithms are proposed. Both numerical analysis and evaluation results are presented, which show the efficiency of the algorithms and their different abilities in adapting to different network situations, such as traffic density and cell capacity.  相似文献   

18.
曾文  王宏 《高技术通讯》2008,18(6):568-572
运用跨层设计思想和方法研究了超宽带(UWB)无线自组织(Ad hoc)网络媒体访问控制(MAC)层协议的设计,提出了一种可利用UWB技术定位性好的优势和实现跨层协作的MAC层协议。该协议通过物理层、MAC层和网络层之间的跨层协作来解决自组织网络单信道无线传输过程中的隐藏终端和暴露终端问题以及网络能量节约问题,以提高网络的性能。仿真实验表明,该协议在平均吞吐量、平均端到端时延以及能量开销等性能指标上,均优于已有的IEEE802.11和MACA—BIMAC协议。该协议的设计思想和方法为下一步的UWB无线Ad hoc网络研究奠定了理论和实验基础。  相似文献   

19.
Vehicular ad hoc networks (VANET), which are created by vehicles equipped with short- and mediumrange wireless communication, have an array of important applications in intelligent transport systems. Many of these applications require reliable, bandwidth-efficient dissemination of traffic and road information via ad hoc network technology. This is a difficult task since inter-vehicular networks often lack continuous end-to-end connectivity and are characterised by large variations in node density. A new epidemic algorithm for information dissemination in highly dynamic and intermittently connected VANET is introduced. It is shown through realistic simulations in highway traffic that the proposed algorithm is capable of reliable and efficient information dissemination in VANET in the face of frequent network fragmentation and large density variations.  相似文献   

20.
Li  D. Xu  Y. Liu  J. 《Communications, IET》2010,4(3):343-352
Peer-to-peer (P2P) networks are very popular for large-scale data sharing in today's internet. It is naturally envisioned that the file sharing would also be an important application for civil mobile ad hoc networks in the future. The authors propose the cooperative diversity download methods utilising the wireless medium and common file sources in wireless P2P networks. The designed protocols including multisource opportunistic direct downloading (MODD) and multi-source opportunistic decode-and-forward downloading (MODFD) can adaptively work in different file distribution scenarios. Both of them rely on the cooperation between the sources or receivers and the proposed distributed source-selection schemes. For the situation with one receiver and multi-source, MODD selects 'best' source with most favourite channel condition from available m sources. In the situation with multiple receivers and sources, the multiple receivers could form the cooperative pairs to receive the data from the selected source based on decode-and-forward transmission strategy. Compared with MODD, MODFD saves the source-selection time and provides incentives for the cooperation between the peers. A distributed collision solving scheme for the selection schemes is also proposed. The information theoretic analysis of outage probability shows that the proposed downloading methods can both obtain m times diversity gain.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号