首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Routing in ad hoc wireless networks does not simply consist in finding a route with shortest length (as in wired networks with virtually error-free communication links), but it requires the creation of a stable and good quality communication route to avoid any unnecessary packet loss. In this paper,we discuss physical layer-oriented routing in ad hoc wireless networks, and we analyse the potential advantages of combining the use of power control (PC) with the chosen routing strategy. More precisely, we propose a modified ad hoc on-demand distance vector (MAODV) routing protocol, with and without PC, derived from the AODV-routing protocol by considering the bit error rate at the end of a multi-hop path as the metric to be minimised for route selection. In other words, we consider routing with a physical layer-oriented quality of service criterion, and we analyse the system performance in scenarios with either strong line-of-sight (LOS) or shadowed communications. Although in a scenario with strong LOS communications there are a few cases where the MAODV-PC protocol offers the best performance, in the presence of shadowed communications the proposed physical layer-oriented strategy is not attractive.  相似文献   

2.
《Communications, IET》2008,2(9):1159-1169
In wireless ad hoc networks, co-channel interference can be suppressed effectively through proper integration of channel assignment (CA) and power control (PC) techniques. Unlike centralised cellular networks where CA and PC can be coordinated by base stations, the integration of CA and PC into infrastructureless wireless ad hoc networks where no global information is available is more technically challenging. The authors model the CA and PC problems as a non-cooperative game, in which all wireless users jointly pick an optimal channel and power level to minimise a joint cost function. To prove the existence and uniqueness of Nash equilibrium (NE) in the proposed non-cooperative CA and PC game (NCPG), the authors break the NCPG into a CA subgame and a PC subgame. It is shown that if NE exists in these two subgames, the existence of NE in the NCPG is ensured. Nonetheless, due to unpredictable network topology and diverse system conditions in wireless ad hoc networks, the NCPG may encounter the dasiaping-pongdasia effect that renders NE unattainable. By incorporating a call-dropping strategy and no-internal-regret learning into the NCPG, an iterative and distributed algorithm that ensures convergence to NE is proposed. It is shown through simulation results that the proposed approach leads to convergence and results in significant improvements in power preservation and system capacity as compared with the popular distributed dynamic CA technique incorporated with PC.  相似文献   

3.
Utilising the battery life and the limited bandwidth available in mobile ad hoc networks (MANETs) in the most efficient manner is an important issue, along with providing security at the network layer. The authors propose, design and describe E2-SCAN, an energy-efficient network layered security solution for MANETs, which protects both routing and packet forwarding functionalities in the context of the on demand distance vector protocol. E2-SCAN is an advanced approach that builds on and improves upon some of the state-of-the-art results available in the literature. The proposed E2-SCAN algorithm protects the routing and data forwarding operations through the same reactive approach, as is provided by the SCAN algorithm. It also enhances the security of the network by detecting and reacting to the malicious nodes. In E2-SCAN, the immediate one-hop neighbour nodes collaboratively monitor. E2-SCAN adopts a modified novel credit strategy to decrease its overhead as the time evolves. Through both analysis and simulation results, the authors demonstrate the effectiveness of E2-SCAN over SCAN in a hostile environment.  相似文献   

4.
分析了Ad Hoc网络的性能与拓扑结构的密切相关性和网络特点,提出了一种适用于Ad Hoc网络的基于计算几何方法和功率控制技术的分布式拓扑控制算法.该算法利用天线判断邻居节点方向,构建局部网络拓扑;采用计算几何法减少邻居数,简化拓扑结构;使用对称机制保障节点间的双向连通,兼顾网络连通性;通过调整功率实现具有健壮性的网络拓扑优化控制.仿真结果表明,该算法在满足网络覆盖度和连通性的前提下,形成了优化的拓扑结构,能够节约能量,延长节点寿命,减少相互干扰,提高信道利用率,降低传输时延,增加吞吐量,改善了网络整体性能.  相似文献   

5.
Link stability and mobility in ad hoc wireless networks   总被引:1,自引:0,他引:1  
The fact that ad hoc networks are required to support mobility of individual network nodes results in problems arising when routing data. These problems include route loss, poor longevity of established routes and asymmetric communications links. Mobility of nodes also increases the control traffic overhead and affects the performance of the protocol. Mobility can, however, be exploited to improve route longevity when establishing the route. In some situations, the source of information is not available (e.g. GPS information in the underground), hence protocols relying on this information will fail to operate correctly. In such situations, alternative `self-content' information should be available to perform the needed task of routing. Three novel schemes that make use of such information, the heading direction angle, to provide a mechanism for establishing and maintaining robust and long-lived routes are presented. The results show that these schemes reduce the overhead and increase the route longevity when compared with the AODV protocol. The schemes described can operate as a standalone mechanism or can be adopted by other routing protocols in order to improve their performance.  相似文献   

6.
7.
《Communications, IET》2009,3(2):293-302
The authors employ a statistical method to characterise the wireless ad hoc network capacity problem. The channel parameters such as path loss and fading are considered in the analysis.Moreover, a simulationmethod based on the probability density function of signal-to-interference-plus-noise power-ratio is introduced. In both analysis and simulation, two receiving methods, matched filter (MF) and minimum-mean-square-error (MMSE) detector, are considered. After establishing the accuracy of the analytic approximation and comparing its results with simulation results, the scalability of a random network is studied. Moreover, the outage and ergodic capacities are determined for various network and channel parameters. It is shown that when MMSE detector is used in the network, the capacity is higher than when MF is used. When number of the nodes increases the total ergodic capacity raises, but per node capacity reduces when using both MF and MMSE detectors. It is shown that the total outage capacity reaches a maximum. This leads to the conclusion that an optimum value for the number of nodes in the network exists, which maximises the outage capacity.  相似文献   

8.
提出了一种基于实时流的无线自组网服务质量(QoS)路由协议,其核心思想是载波侦听范围内的节点间通过交换实时流的带宽消耗和本地可用带宽信息,估计出节点的邻居可用带宽,根据此带宽进行路由发现和新实时流的接纳控制,并根据实时流的带宽要求预留资源。对每个实时流分别建立一条路由,避免相同源和目的的实时流之间的竞争,有利于负载均衡。模拟实验表明,这种基于实时流的QoS路由协议能够为实时应用提供更好的OoS保障。  相似文献   

9.
针对传统的基于竞争或调度的MAC协议用于节点密集部署的无线传感器网络中,会出现较低的吞吐量和累计延迟等问题,利用节点密集部署的无线传感器网络中普遍存在的捕获效应对MAC协议性能的影响,提出了一种单信道模式下工作的并行传输的新型高效MAC协议——基于非合作博弈功率控制的并行传输MAC协议.该协议运用博弈理论中非合作不完全...  相似文献   

10.
There are a number of critical problems related to road safety in intelligent transportation systems (ITS) caused by increased vehicle usage, urbanisation, population growth and density, and faster rates of movements of goods and people. It is envisaged that vehicular ad hoc networks (VANETs) will bring about a substantial change to the way our road transport operates to improving road safety and traffic congestion. A major challenge in VANETs is to provide real-time transfer of information between vehicles within a highly mobile environment. The authors propose a new clustering scheme named robust mobility adaptive clustering (RMAC) to strategically enable and manage highly dynamic VANETs for future ITS. It employs a novel node precedence algorithm to adaptively identify the nearby 1-hop neighbours and select optimal clusterheads based on relative node mobility metrics of speed, locations and direction of travel. Furthermore, the zone of interest concept is introduced for optimised approach to the network structure such that each vehicular node maintains a neighbour table of nodes, beyond its communications range, that reflects the frequent changes on the network and provides prior knowledge of neighbours as they travel into new neighbourhoods. RMAC predominantly employs more reliable unicast control packets and supports geographic routing by providing accurate neighbour information crucial when making routing decisions in multi-hop geographic routing. It is shown by simulations that RMAC on IEEE802.11 ad hoc WLAN protocol is very effective in a highly dynamic VANETs environment, being robust on link failures, and having very high cluster residence times compared to the well known distributed mobility clustering scheme.  相似文献   

11.
仿真并分析了无线自组网TCP数据流重传超时(RTO)与传输往返时间(RTT)的关系,指出在RTT剧烈振荡的无线多跳网络环境下RTO的变化会滞后于RTT的变化,导致根据RFC2988标准做出的RTO估计不准确。针对这种情况,利用网络演算理论推导出了TCP数据流的最小延迟上界(MDUB),并以此改进了RTO的估计算法。仿真实验表明,基于最小延迟上界的RTO估计算法能准确地估计数据包的最小传输往返时间上界,减少TCP数据传输中的伪重传,提升无线环境下TCP协议的性能。  相似文献   

12.
曾文  王宏 《高技术通讯》2008,18(6):568-572
运用跨层设计思想和方法研究了超宽带(UWB)无线自组织(Ad hoc)网络媒体访问控制(MAC)层协议的设计,提出了一种可利用UWB技术定位性好的优势和实现跨层协作的MAC层协议。该协议通过物理层、MAC层和网络层之间的跨层协作来解决自组织网络单信道无线传输过程中的隐藏终端和暴露终端问题以及网络能量节约问题,以提高网络的性能。仿真实验表明,该协议在平均吞吐量、平均端到端时延以及能量开销等性能指标上,均优于已有的IEEE802.11和MACA—BIMAC协议。该协议的设计思想和方法为下一步的UWB无线Ad hoc网络研究奠定了理论和实验基础。  相似文献   

13.
Although the scheduling problem of the uplink transmission in the IEEE 802.16 broadband wireless access network is extensively discussed, most of the results are limited to the quality of service (QoS) upon throughput and delay requirement. But as in practice only limited wireless resources are made available, a fairness-based scheduling upon each connection?s QoS provides better outcomes. In this study, the authors propose a new fair uplink scheduling for real-time polling service and non-real-time polling service with the proportional sharing of excess bandwidth of the network. To implement the proposed fair scheduling that satisfies the delay requirement and full bandwidth utilisation, the authors introduce the rate control algorithm. With the proposed scheduling, we guarantee the fairness, delay requirement and full bandwidth utilisation which are not fully achieved in the existing results.  相似文献   

14.
This study proposes a novel multi-channel medium access control protocol for mobile ad hoc networks that enables nodes to transmit packets in distributed channels. In our protocol, the ad hoc traffic indication message window is divided into two windows. The first window is called the deciding channel window (DCW). Source and destination nodes can negotiate with each other in deciding a channel that can be used to compete for the final data channel in the DCW. The second window is called the exchanging packet window (EPW). Pair source and destination nodes can compete to obtain a channel to transfer packets in the EPW. This mechanism can distribute pair source and destination nodes to compete for a data channel. Hence, because of this, collisions can be avoided greatly and throughput can be increased. The simulation results show that our protocol successfully exploits the use of the bandwidth of multiple channels effectively.  相似文献   

15.
The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more vulnerable to security attacks. However, providing a security mechanism implicitly has been a major challenge in such an ad-hoc environment. Certificate management plays an important role in securing an ad-hoc network. Certificate assignment, verification, and revocation complexity associated with the Public Key Infrastructure (PKI) framework is significantly large. Smaller the size of the network lesser will be the certificate management complexity. However, smaller the size, large will be the overall infrastructural cost, and also larger will be the overall redundant certificates due to multiple certificate assignment at the boundary regions, that in turn affects the prompt and accurate certificate revocation. By taking these conflicting requirements into consideration, we propose the trust-based hexagonal clustering for an efficient certificate management (THCM) scheme, to bear an absolutely protected MANET Disparate to the existing clustering techniques, we present a hexagonal geographic clustering model with Voronoi technique where trust is accomplished. In particular, to compete against attackers, we initiate a certificate management strategy in which certificate assignment, verification, and revocation are carried out efficiently. The performance of THCM is evaluated by both simulation and empirical analysis in terms of effectiveness of revocation scheme (with respect to revocation rate and time), security, and communication cost. Besides, we conduct a mathematical analysis of measuring the parameters obtained from the two platforms in multiple times. Relevant results demonstrate that our design is efficient to guarantee a secured mobile ad hoc network.  相似文献   

16.
The recently permitted unlicenced use of the regulated ultra-wideband (UWB) radio spectrum (regulated first by the US FCC in 2002 and subsequently by the standardisation bodies of EU and other major countries) provides wireless ad hoc networks a cheap and promising air-interface technology for their adopted wireless data links, thus offering the potential to greatly boost their applications. The impacts of such UWB data links, mainly the more likely adopted impulse-based UWB data links for low data rate applications, on the extensively developed cooperative wireless ad hoc networks are investigated. First, the authors investigate the diversity order of data transfer of each impulse-based UWB data link working in a corresponding fading channel, and give an approximate relationship between the diversity order and the channel model parameters (here the Saleh?Valenzuela model parameters); Secondly, the authors develop efficient cooperative and decentralised diversity schemes that can utilise the widely spread and independently distributed multiple paths of the fading UWB channels. Performance analysis and simulation studies show that proposed decentralised cooperative beamforming schemes can achieve full diversity and are more efficient than their decentralised cooperative routing counterparts.  相似文献   

17.
Awdeh  R.Y. 《Communications, IET》2007,1(6):1187-1194
Previous work has shown that TCP (transmission control protocol) Vegas outperforms the more widely deployed TCP Reno in both wired and wireless networks. It was also shown that when both TCP variants coexist on the same wired links, Reno dominates because of its more aggressive behaviour. This paper examines for the first time the compatibility between Reno and Vegas in wireless IEEE 802.11 ad hoc networks. It is shown that Vegas generally dominates in the heterogeneous Reno/Vegas network scenario; a startling result that is inconsistent with what is seen in wired networks. It is shown that the wireless ad hoc network environment does not reward the aggressive behaviour of Reno. On the other hand, Vegas, with its more accurate yet more conservative mechanisms, is able to capture most of the bandwidth. This is found to be true when using the on-demand routing protocols of dynamic source routing (DSR) or ad hoc on-demand distance vector (AODV): the failure of a node to reach a next-hop node because of media access control (MAC)-sublayer repeated collisions is reported to the routing protocol, which then declares a route error that impacts Reno in a more serious way than Vegas. When the table-driven routing protocol destination-sequenced distance vector (DSDV) is used, Reno and Vegas share the network bandwidth in a fairer manner. Generally, fairness in this environment can be improved by reducing the TCP maximum window size.  相似文献   

18.
Peer-to-peer (P2P) communications have attracted a great deal of attention from the network research community in recent years. However, due to the fundamental limitations of wireless environments, providing reliable data availability for P2P applications over wireless ad hoc networks is still a major challenge. To address the problem, a distributed and randomised scheme based on self-avoiding walks is proposed. The scheme concatenates disparate network layers, with the goal of recovering from routing failures that disrupt P2P data accessibility. In addition, a probabilistic approach is presented that explores the tradeoffs between several system parameters. Some new analysis tools, such as path coupling, are utilised which provide a better understanding of the system's operations. That the proposed concepts and techniques make a significant contribution to the design of effective and efficient P2P applications in wireless ad hoc networks is believed.  相似文献   

19.
Wireless networked control systems (WNCS) over mobile ad hoc network (MANET) is a new area of research and has many potential applications, for instance, military or rescue missions, exploring hazardous environments, and so on. For performance evaluation, researchers mostly rely on computer simulations as WNCS experiments are expensive to execute. It will generate a significant benefit to conduct performance analysis of WNCS over MANET using co-simulation that utilises SIMULINK and OPtimised Network Engineering Tool (OPNET) to simulate plant/controller behaviour and the MANET, respectively. Previous conference papers by the authors reported the initial SIMULINK-OPNET co-simulation for only one network size. Here the authors present an extention of their previous work, and presents the SIMULINK-OPNET co-simulation, methodology and comprehensive simulation results that have not been reported previously. It also considers the impact of five network sizes with stationary and mobile nodes. The proposed SIMULINK-OPNET co-simulation is applied to WNCS over MANET using a realistic wireless communication model. It investigates the impact of network data rates, node mobility, the packet delay, packet drop on the system stability and performance.  相似文献   

20.
Mobile ad hoc networks (MANETs) are unpredictable by nature. Providing any kind of reliability for quality of service (QoS) in such networks is challenging. Quantifying available resources accurately, avoiding interference with ongoing QoS traffic and adapting to QoS violations caused by nodes' mobility are the main concerns for the design of an efficient admission control protocol in MANETs. Adaptive admission control (AAC), a novel admission control protocol which uses robust and accurate resource estimation and prediction techniques for relevant admission decisions has been proposed. Furthermore, AAC uses statistical QoS provision to counteract the QoS threatening mobility. Through simulations, we show that our proposed scheme outperforms existing approaches in terms of correctness and overall performance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号