首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks   总被引:28,自引:0,他引:28  
An ad hoc network is a dynamically reconfigurable wireless network with no fixed infrastructure or central administration. Each host is mobile and must act as a router. Routing and multicasting protocols in ad hoc networks are faced with the challenge of delivering data to destinations through multihop routes in the presence of node movements and topology changes. This paper presents the On-Demand Multicast Routing Protocol (ODMRP) for wireless mobile ad hoc networks. ODMRP is a mesh-based, rather than a conventional tree-based, multicast scheme and uses a forwarding group concept; only a subset of nodes forwards the multicast packets via scoped flooding. It applies on-demand procedures to dynamically build routes and maintain multicast group membership. ODMRP is well suited for ad hoc wireless networks with mobile hosts where bandwidth is limited, topology changes frequently, and power is constrained. We evaluate ODMRP performance with other multicast protocols proposed for ad hoc networks via extensive and detailed simulation.  相似文献   

2.
Approximate minimum-energy multicasting in wireless ad hoc networks   总被引:4,自引:0,他引:4  
A wireless ad hoc network consists of mobile nodes that are equipped with energy-limited batteries. As mobile nodes are battery-operated, an important issue in such a network is to minimize the total power consumption for each operation. Multicast is one of fundamental operations in any modern telecommunication network including wireless ad hoc networks. Given a multicast request consisting of a source node and a set of destination nodes, the problem is to build a minimum-energy multicast tree for the request such that the total transmission power consumption in the tree is minimized. Since the problem in a symmetric wireless ad hoc network is NP-complete, we instead devise an approximation algorithm with provable approximation guarantee. The approximation of the solution delivered by the proposed algorithm is within a constant factor of the best-possible approximation achievable unless P = NP.  相似文献   

3.
Transmission Range Effects on AODV Multicast Communication   总被引:3,自引:0,他引:3  
As laptop computers begin to dominate the marketplace, wireless adapters with varying bandwidth and range capabilities are being developed by hardware vendors. To provide multihop communication between these computers, ad hoc mobile networking is receiving increasing research interest. While increasing a node's transmission range allows fewer hops between a source and destination and enhances overall network connectivity, it also increases the probability of collisions and reduces the effective bandwidth seen at individual nodes. To enable formation of multihop ad hoc networks, a routing protocol is needed to provide the communication and route finding capability in these networks. The Ad hoc On-Demand Distance Vector Routing protocol (AODV) has been designed to provide both unicast and multicast communication in ad hoc mobile networks. Because AODV uses broadcast to transmit multicast data packets between nodes, the transmission range plays a key role in determining the performance of AODV. This paper studies the effects of transmission range on AODV's multicast performance by examining the results achieved at varying transmission ranges and network configurations.  相似文献   

4.
5.
A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most secure protocols in mobile ad hoc networks, such as secure routing, key agreement and secure group communication protocols, assume that all nodes must have pre‐shared a secret, or pre‐obtained public‐key certificates before joining the network. However, this assumption has a practical weakness for some emergency applications, because some nodes without pre‐obtained certificates will be unable to join the network. In this paper, a heterogeneous‐network aided public‐key management scheme for mobile ad hoc networks is proposed to remedy this weakness. Several heterogeneous networks (such as satellite, unmanned aerial vehicle, or cellular networks) provide wider service areas and ubiquitous connectivity. We adopt these wide‐covered heterogeneous networks to design a secure certificate distribution scheme that allows a mobile node without a pre‐obtained certificate to instantly get a certificate using the communication channel constructed by these wide‐covered heterogeneous networks. Therefore, this scheme enhances the security infrastructure of public key management for mobile ad hoc networks. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

6.
Wireless ad hoc networks are growing important because of their mobility, versatility, and ability to work with fewer infrastructures. The mobile ad hoc network is an autonomous system consisting of mobile nodes connected with wireless links. Establishing a path between two nodes is a complex task in wireless networks. It is still more complex in the wireless mobile ad hoc network because every node is no longer as an end node and an intermediate node. In this paper, it focuses on design of connectionless routing protocol for the wireless ad hoc networks based on the mobile agent concept. The proposed model tries to discover the best path taking into consideration some concerns like bandwidth, reliability, and congestion of the link. The proposed model has been simulated and tested under various wireless ad hoc network environments with the help of a different number of nodes. The results demonstrate that the proposed model is more feasible for providing reliable paths between the source and destination with the minimum control message packets over the network. It has delivered more number of packets to the destination over the network. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

7.
A wireless ad hoc network consists of mobile nodes that are powered by batteries. The limited battery lifetime imposes a severe constraint on the network performance, energy conservation in such a network thus is of paramount importance, and energy efficient operations are critical to prolong the lifetime of the network. All-to-all multicasting is one fundamental operation in wireless ad hoc networks, in this paper we focus on the design of energy efficient routing algorithms for this operation. Specifically, we consider the following minimum-energy all-to-all multicasting problem. Given an all-to-all multicast session consisting of a set of terminal nodes in a wireless ad hoc network, where the transmission power of each node is either fixed or adjustable, assume that each terminal node has a message to share with each other, the problem is to build a shared multicast tree spanning all terminal nodes such that the total energy consumption of realizing the all-to-all multicast session by the tree is minimized. We first show that this problem is NP-Complete. We then devise approximation algorithms with guaranteed approximation ratios. We also provide a distributed implementation of the proposed algorithm. We finally conduct experiments by simulations to evaluate the performance of the proposed algorithm. The experimental results demonstrate that the proposed algorithm significantly outperforms all the other known algorithms.  相似文献   

8.
An adaptive management architecture for ad hoc networks   总被引:13,自引:0,他引:13  
Ad hoc networks, where mobile nodes communicate via multihop wireless links, facilitate network connectivity without the aid of any preexisting networking infrastructure. The intrinsic attributes of ad hoc networks, such as dynamic network topology, limited battery power, constrained wireless bandwidth and quality, and large number of heterogeneous nodes, make network management significantly more challenging than stationary and wired networks. In particular, the conventional client/server-based manager/agent management paradigm falls short of addressing these issues. We describe the Guerrilla management architecture to facilitate adaptive and autonomous management of ad hoc networks. The management capability of Guerrilla is scalable to accommodate the sheer number and heterogeneity of nodes, autonomous and survivable to adapt to network dynamics, and economical to minimize management overhead.  相似文献   

9.

Secure and efficient group communication among mobile nodes is one of the significant aspects in mobile ad hoc networks (MANETs). The group key management (GKM) is a well established cryptographic technique to authorise and to maintain group key in a multicast communication, through secured channels. In a secure group communication, a one-time session key is required to be shared between the participants by using distributed group key agreement (GKA) schemes. Due to the resource constraints of ad hoc networks, the security protocols should be communication efficient with less overhead as possible. The GKM solutions from various researches lacks in considering the mobility features of ad hoc networks. In this paper, we propose a hexagonal clustered one round distributed group key agreement scheme with trust (HT-DGKA) in a public key infrastructure based MANET environment. The proposed HT-DGKA scheme guarantees an access control with key authentication and secrecy. The performance of HT-DGKA is evaluated by simulation analysis in terms of key agreement time and overhead for different number of nodes. Simulation results reveal that the proposed scheme guarantees better performance to secure mobile ad hoc network. It is demonstrated that the proposed scheme possesses a maximum of 2250 ms of key agreement time for the higher node velocity of 25 m/s and lower key agreement overhead. Also, the HT-DGKA scheme outperforms the existing schemes in terms of successful message rate, packet delivery ratio, level of security, computation complexity, number of round, number of exponentiations and number of message sent and received that contribute to the network performance.

  相似文献   

10.
Dario  Marco   《Ad hoc Networks》2006,4(6):724-748
Ad hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Existing multicast protocols fall short in a harsh ad hoc mobile environment, since node mobility causes conventional multicast trees to rapidly become outdated. The amount of bandwidth resource required for building up a multicast tree is less than that required for other delivery structures, since a tree avoids unnecessary duplication of data. However, a tree structure is more subject to disruption due to link/node failure and node mobility than more meshed structures. This paper explores these contrasting issues and proposes PPMA, a Probabilistic Predictive Multicast Algorithm for ad hoc networks, that leverages the tree delivery structure for multicasting, solving its drawbacks in terms of lack of robustness and reliability in highly mobile environments. PPMA overcomes the existing trade-off between the bandwidth efficiency to set up a multicast tree, and the tree robustness to node energy consumption and mobility, by decoupling tree efficiency from mobility robustness. By exploiting the non-deterministic nature of ad hoc networks, the proposed algorithm takes into account the estimated network state evolution in terms of node residual energy, link availability and node mobility forecast, in order to maximize the multicast tree lifetime, and consequently reduce the number of costly tree reconfigurations. The algorithm statistically tracks the relative movements among nodes to capture the dynamics in the ad hoc network. This way, PPMA estimates the node future relative positions in order to calculate a long-lasting multicast tree. To do so, it exploits the most stable links in the network, while minimizing the total network energy consumption. We propose PPMA in both its centralized and distributed version, providing performance evaluation through extensive simulation experiments.  相似文献   

11.
Power-aware routing protocols in ad hoc wireless networks   总被引:5,自引:0,他引:5  
An ad hoc wireless network has no fixed networking infrastructure. It consists of multiple, possibly mobile, nodes that maintain network connectivity through wireless communications. Such a network has practical applications in areas where it may not be economically practical or physically possible to provide a conventional networking infrastructure. The nodes in an ad hoc wireless network are typically powered by batteries with a limited energy supply. One of the most important and challenging issues in ad hoc wireless networks is how to conserve energy, maximizing the lifetime of its nodes and thus of the network itself. Since routing is an essential function in these networks, developing power-aware routing protocols for ad hoc wireless networks has been an intensive research area in recent years. As a result, many power-aware routing protocols have been proposed from a variety of perspectives. This article surveys the current state of power-aware routing protocols in ad hoc wireless networks.  相似文献   

12.
Multicasting has emerged as one of the most focused areas in the field of networking. As the technology and popularity of the Internet grow, applications such as video conferencing that require the multicast feature are becoming more widespread. Another interesting development has been the emergence of dynamically reconfigurable wireless ad hoc networks to interconnect mobile users for applications ranging from disaster recovery to distributed collaborative computing. In this article we describe the on-demand multicast routing protocol for mobile ad hoc networks. ODMRP is a mesh-based, rather than conventional tree-based, multicast scheme and uses a forwarding group concept (only a subset of nodes forwards the multicast packets packets via scoped flooding). It applies on-demand procedures to dynamically build routes and maintain multicast group membership. We also describe our implementation of the protocol in a real laptop testbed  相似文献   

13.
Multicast is an efficient method for transmitting the same packets to a group of destinations. In energy-constrained wireless ad hoc networks where nodes are powered by batteries, one of the challenging issues is how to prolong the multicast lifetime. Most of existing work mainly focuses on multicast lifetime maximization problem in wireless packet loss-free networks. However, this may not be the case in reality. In this paper, we are concerned with the multicast lifetime maximization problem in unreliable wireless ad hoc networks. To solve this problem, we first define the multicast lifetime as the number of packets transmitted along the multicast tree successfully. Then we develop a novel lifetime maximization genetic algorithm to construct the multicast tree consisting of high reliability links subject to the source and destination nodes. Simulation results demonstrate the efficiency and effectiveness of the proposed algorithm.  相似文献   

14.
Wireless ad hoc and sensor networks are emerging with advances in electronic device technology, wireless communications and mobile computing with flexible and adaptable features. Routing protocols act as an interface between the lower and higher layers of the network protocol stack. Depending on the size of target nodes, routing techniques are classified into unicast, multicast and broadcast protocols. In this article, we give analysis and performance evaluation of tree‐based multicast routing in wireless sensor networks with varying network metrics. Geographic multicast routing (GMR) and its variations are used extensively in sensor networks. Multicast routing protocols considered in the analytical model are GMR, distributed GMR, demand scalable GMR, hierarchical GMR, destination clustering GMR and sink‐initiated GMR. Simulations are given with comparative analysis based on varying network metrics such as multicast group size, number of sink nodes, average multicast latency, number of clusters, packet delivery ratio, energy cost ratio and link failure rate. Analytical results indicate that wireless sensor network multicast routing protocols operate on the node structure (such as hierarchical, clustered, distributed, dense and sparse networks) and application specific parameters. Simulations indicate that hierarchical GMR is used for generic multicast applications and that destination clustering GMR and demand scalable GMR are used for distributed multicast applications. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

15.
Recent technological advances in wireless communications offer new opportunities and challenges for wireless ad hoc networking. In the absence of the fixed infrastructure that characterizes traditional wireless networks, control and management of wireless ad hoc networks must be distributed across the nodes, thus requiring carefully designed Medium Access Control (MAC) layer protocols. In this article we survey, classify, and analyze 34 MAC layer protocols for wireless ad hoc networks, ranging from industry standards to research proposals. Through this analysis, six key features emerge: (1) channel separation and access; (2) topology; (3) power; (4) transmission initiation; (5) traffic load and scalability; and (6) range. These features allow us to characterize and classify the protocols, to analyze the tradeoffs produced by different design decisions, and to assess the suitability of various design combinations for ad hoc network applications. The classification and the tradeoff analysis yield design guidelines for future wireless ad hoc network MAC layer protocols.  相似文献   

16.
A privacy-preserving secure communication in ad hoc (without infrastructure) mission critical wireless networking system suitable for unmanned aerial vehicle communication systems is introduced and analyzed. It is expected that in a critical condition, few ad hoc (without infrastructure) mission critical wireless networking systems will work together. To make the simple and low cost privacy-preserving secure communication among the same network, each transmitting mobile node generates packets in such a way that its wanted receiving mobile nodes can read the message packets easily. On the other hand, the unwanted receiving mobile nodes from other networks cannot read those message packets. In addition, the unwanted receiving mobile nodes receive ‘jamming packets’ if they try to read them. This mechanism prevents the malicious receivers (readers from other networks) from reading the packets and obtaining information from this network. Results show that the throughput is very high and does not detect any jamming packets, if the receiving nodes of a network try to read packets transmitted by the nodes from the same networks.  相似文献   

17.
The capacity of mobile ad hoc networks is constrained by the intra-flow interference introduced by adjacent nodes on the same path, and inter-flow interference generated by nodes from neighboring paths. By assigning orthogonal channels to neighboring nodes, one can minimize both types of interferences and allow concurrent transmissions within the neighborhood, thus improving the throughput and delay performance of the ad hoc network. In this paper, we present three novel distributed channel assignment protocols for multi-channel mobile ad hoc networks. The proposed protocols combine channel assignment with distributed on-demand routing, and only assign channels to active nodes. They are shown to require fewer channels and exhibit lower communication, computation, and storage complexity, compared with existing approaches. Through simulation studies, we show that the proposed protocols can effectively increase throughput and reduce delay, as compared to several existing schemes, thus providing an effective solution to the low capacity problem in multi-hop wireless networks.  相似文献   

18.
By adjusting the transmission power of mobile nodes, topology control aims to reduce wireless interference, reduce energy consumption, and increase effective network capacity, subject to connectivity constraints. In this paper, we introduce the Ant-Based Topology Control (ABTC) algorithm that adapts the biological metaphor of Swarm Intelligence to control topology of mobile ad hoc networks. ABTC is a distributed algorithm where each node asynchronously collects local information from nearby nodes, via sending and receiving ant packets, to determine its appropriate transmission power. The operations of ABTC do not require any geographical location, angle-of-arrival, topology, or routing information, and are scalable. In particular, ABTC attempts to minimize the maximum power used by any node in the network, or minimize the total power used by all of the nodes in the network. By adapting swarm intelligence as an adaptive search mechanism, ABTC converges quickly to a good power assignment with respect to minimization objectives, and adapts well to mobility. In addition, ABTC may achieve common power, or properly assign power to nodes with non-uniform distribution. Results from a thorough comparative simulation study demonstrate the effectiveness of ABTC for different mobility speed, various density, and diverse node distributions.This work is supported in part by National Science Foundation under grant ANI-0240398.Chien-Chung Shen received his B.S. and M.S. degrees from National Chiao Tung University, Taiwan, and his Ph.D. degree from UCLA, all in computer science. He was a research scientist at Bellcore Applied Research working on control and management of broadband networks. He is now an assistant professor in the Department of Computer and Information Sciences of the University of Delaware, and a recipient of NSF CAREER Award. His research interests include ad hoc and sensor networks, control and management of broadband networks, distributed object and peer-to-peer computing, and simulation.Zhuochuan Huang received his B.E. degree in Computer Science and Technology from Tsinghua University, P.R. China, in 1998, and his M.S. degree in Computer Science from University of Delaware in 2000. He is currently a PhD candidate with the Department of Computer and Information Sciences at the University of Delaware. His current research interests include the design and simulation of protocols for mobile ad hoc networks.Chaiporn Jaikaeo received his B.Eng degree in computer engineering from Kasetsart University, Thailand, and his M.S. and Ph.D. degrees in computer and information sciences from the University of Delaware in 1996, 1999 and 2004, respectively. He is currently a lecturer in the Department of Computer Engineering at Kasetsart University. His research interests include unicast and multicast routing, topology control, peer-to-peer computing and network management for mobile wireless ad hoc and sensor networks.  相似文献   

19.
Securing ad hoc networks   总被引:22,自引:0,他引:22  
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats on ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which terms the core of our security framework  相似文献   

20.
网络编码在MANET最小能量多播中的应用研究   总被引:1,自引:0,他引:1  
党安喜  裴炳南 《通信技术》2008,41(4):105-107
网络编码理论是当代信息论的重要组成部分,移动特设网络(MANET)是由-组带有无线收发装置的移动终端组成的一个多跳临时性自治系统,利用网络编码理论解决MANET中最小能量多播问题是无线通信中新的研究热点之一.文中阐述了网络编码基本理论在无线通信中应用的技术原理,然后通过构建无线网络节点分层模型分析了基于网络编码的MANET最小能量求解过程,为解决该类型网络中能耗问题提供新的视角.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号