首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Moving toward 4G, wireless ad hoc networks receive growing interest due to users' provisioning of mobility, usability of services, and seamless communications. In ad hoc networks fading environments provide the opportunity to exploit variations in channel conditions, and transmit to the user with the currently "best" channel. In this article two types of opportunistic transmission, which leverage time diversity and multi-user diversity, respectively, are studied. Considering the co-channel interference and lack of a central controller in ad hoc networks, the "cooperative and opportunistic transmission" concept is promoted. For opportunistic transmission that exploits time diversity, it is observed that the inequality in channel contention due to the hidden terminal phenomenon tends to result in energy inefficiency. Under this design philosophy, we propose a distributed cooperative rate adaptation (CRA) scheme to reduce overall system power consumption. Taking advantage of the time-varying channel among different users/receivers and being aware of the potential contention among neighboring transmissions, we propose a QoS-aware cooperative and opportunistic scheduling (COS) scheme to improve system performance while satisfying QoS requirements of individual flows. Simulation results show that by leveraging node cooperation, our proposed schemes, CRA and COS, achieve higher network throughput and provide better QoS support than existing work  相似文献   

2.
To exploit multiuser diversity and achieve QoS requirements in MIMO ad hoc networks, we propose an optimal scheduling policy which utilizes stream control schemes. We also present a medium access control (MAC) protocol to implement the optimal scheduling policy. Simulation results show that our implementation achieves higher network throughput and provides better QoS support than the existing solutions.  相似文献   

3.
Self-coordinating localized fair queueing in wireless ad hoc networks   总被引:2,自引:0,他引:2  
Distributed fair queueing in a multihop, wireless ad hoc network is challenging for several reasons. First, the wireless channel is shared among multiple contending nodes in a spatial locality. Location-dependent channel contention complicates the fairness notion. Second, the sender of a flow does not have explicit information regarding the contending flows originated from other nodes. Fair queueing over ad hoc networks is a distributed scheduling problem by nature. Finally, the wireless channel capacity is a scarce resource. Spatial channel reuse, i.e., simultaneous transmissions of flows that do not interfere with each other, should be encouraged whenever possible. In this paper, we reexamine the fairness notion in an ad hoc network using a graph-theoretic formulation and extract the fairness requirements that an ad hoc fair queueing algorithm should possess. To meet these requirements, we propose maximize-local-minimum fair queueing (MLM-FQ), a novel distributed packet scheduling algorithm where local schedulers self-coordinate their scheduling decisions and collectively achieve fair bandwidth sharing. We then propose enhanced MLM-FQ (EMLM-FQ) to further improve the spatial channel reuse and limit the impact of inaccurate scheduling information resulted from collisions. EMLM-FQ achieves statistical short-term throughput and delay bounds over the shared wireless channel. Analysis and extensive simulations confirm the effectiveness and efficiency of our self-coordinating localized design in providing global fair channel access in wireless ad hoc networks.  相似文献   

4.
Code division multiple access (CDMA) ad hoc networks have been considered a promising multiple-channel networking architecture for connecting tactical platforms in battle fields. In this paper we consider a network of a swarm of unmanned aerial vehicles (UAVs) that are used in a tactical surveillance mission. The UAVs are assumed to have multiuser detection capability and form a CDMA-based ad hoc network. A token circulation scheme is proposed to conduct functions required at the medium access control layer including detection of hidden/lost neighbors, code assignment and schedule-based cooperative transmission scheduling. In the proposed scheme, a token continuously circulates around the network based on the “receive-forward” module. Through circulation of the token, each UAV can detect its hidden and/or lost neighbors in near real-time, assign codes enabling the spatial reuse of code channels without incurring code collision, and schedule data transmissions in a cooperative and distributed manner. In addition, the proposed scheme is able to take advantage of multiuser detection functionality and allows for simultaneous transmissions from multiple transmitters to a same receiver. The performance of the proposed token circulation scheme is evaluated, both analytically and through simulations. It is shown that the latency of the token is at most linearly proportional to the network size, and the average delay of a data packet increases with either the packet generation rate or the network size. The results also show that the proposed token circulation scheme is suitable for large-scale CDMA-based UAV ad hoc networks with even heavy network traffic load.  相似文献   

5.
Distributed cooperative MAC for multihop wireless networks   总被引:2,自引:0,他引:2  
This article investigates distributed cooperative medium access control protocol design for multihop wireless networks. Cooperative communication has been proposed recently as an effective way to mitigate channel impairments. With cooperation, single-antenna mobile terminals in a multi-user environment share antennas from other mobiles to generate a virtual multipleantenna system that achieves more reliable communication with a higher diversity gain. However, more mobiles conscribed for one communication inevitably induces complex medium access interactions, especially in multihop wireless ad hoc networks. To improve the network throughput and diversity gain simultaneously, we investigate the issues and challenges in designing an efficient MAC scheme for such networks. Furthermore, based on the IEEE 802.11 DCF, a cross-layer designed cooperative MAC protocol is proposed. The MAC scheme adapts to the channel condition and payload length.  相似文献   

6.
ad hoc网络中一种基于信任模型的机会路由算法   总被引:2,自引:0,他引:2  
王博  陈训逊 《通信学报》2013,34(9):92-104
由于ad hoc网络具有缺乏足够的物理保护、拓扑结构动态变化、采用分布式协作、节点的带宽和计算能力有限等特点,导致传统的路由安全机制不再适合ad hoc网络路由协议的设计。最近当前研究热点之一的机会路由能够在链路不可靠的情况下充分利用无线广播和空间多样性的特性提高网络的吞吐量。因此,考虑在机会路由中引入信任相似性概念设计信任机会路由,建立了基于节点信任度和最小成本的信任机会转发模型,提出了最小成本的机会路由算法MCOR,并对算法进行了理论上的分析和证明。最后采用仿真实验对该算法进行验证,又与经典机会路由协议ExOR以及其他经典的信任路由协议TAODV和Watchdog-DSR进行性能对比。仿真结果表明,MCOR算法能够防范恶意节点的攻击,在吞吐量、端到端时延、期望转发次数(ETX)和成本开销等方面都比其他3种协议表现出性能上的优势。  相似文献   

7.
徐方  张沪寅  王晶  徐宁  汪志勇  邓敏 《电子学报》2015,43(5):833-840
无线智能设备的普遍使用促进了机会网络的发展.这类网络处于间歇性连接状态,以自组织方式转发数据.路由协议设计时考虑节点携带者的社会特征和日常行为能够提高机会网络的性能.提出了一种基于社会上下文认知的机会路由算法SCOR,该算法利用网络中的社会上下文信息,通过BP神经网络模型预测节点的移动行为.路由决策过程充分考虑移动节点活动的时间和空间属性,当接收节点与发送节点同时处于网络中的同一连通域时,数据转发采用同步方式,否则采用异步方式.仿真分析和实验结果表明,与其它经典算法相比,SCOR算法提高了数据成功转发的比率,减少了网络的开销.  相似文献   

8.
Algorithms for scheduling TDMA transmissions in multi-hop networks usually determine the smallest length conflict-free assignment of slots in which each link or node is activated at least once. This is based on the assumption that there are many independent point-to-point flows in the network. In sensor networks however often data are transferred from the sensor nodes to a few central data collectors. The scheduling problem is therefore to determine the smallest length conflict-free assignment of slots during which the packets generated at each node reach their destination. The conflicting node transmissions are determined based on an interference graph, which may be different from connectivity graph due to the broadcast nature of wireless transmissions. We show that this problem is NP-complete. We first propose two centralized heuristic algorithms: one based on direct scheduling of the nodes or node-based scheduling, which is adapted from classical multi-hop scheduling algorithms for general ad hoc networks, and the other based on scheduling the levels in the routing tree before scheduling the nodes or level-based scheduling, which is a novel scheduling algorithm for many-to-one communication in sensor networks. The performance of these algorithms depends on the distribution of the nodes across the levels. We then propose a distributed algorithm based on the distributed coloring of the nodes, that increases the delay by a factor of 10–70 over centralized algorithms for 1000 nodes. We also obtain upper bound for these schedules as a function of the total number of packets generated in the network.  相似文献   

9.
Carrier sense multiple access (CSMA) is one of the most pervasive medium access control (MAC) schemes in ad hoc, wireless networks. However, CSMA and its current variants do not provide quality-of-service (QoS) guarantees for real-time traffic support. This paper presents and studies black-burst (BB) contention, which is a distributed MAC scheme that provides QoS real-time access to ad hoc CSMA wireless networks. With this scheme, real-time nodes contend for access to the channel with pulses of energy-so called BBs-the durations of which are a function of the delay incurred by the nodes until the channel became idle. It is shown that real-time packets are not subject to collisions and that they have access priority over data packets. When operated in an ad hoc wireless LAN, BB contention further guarantees bounded and typically very small real-time delays. The performance of the network can approach that attained under ideal time division multiplexing (TDM) via a distributed algorithm that groups real-time packet transmissions into chains. A general analysis of BB contention is given, contemplating several modes of operation. The analysis provides conditions for the scheme to be stable. Its results are complemented with simulations that evaluate the performance of an ad hoc wireless LAN with a mixed population of data and real-time nodes  相似文献   

10.
In delay-tolerant mobile ad hoc networks, motion of network nodes, network sparsity and sporadic density can cause a lack of guaranteed connectivity. These networks experience significant link delay and their routing protocols must take a store-and-forward approach. In this paper, an opportunistic routing protocol is proposed, along with its compatible media access control, for non-real-time services in delay-tolerant networks. The scheme is mobility-aware such that each network node needs to know its own position and velocity. The media access control employs a four-fold handshake procedure to probe the wireless channel and cooperatively prioritize candidate nodes for packet replication. It exploits the broadcast characteristic of the wireless medium to utilize long-range but unreliable links. The routing process seizes opportunities of node contacts for data delivery. It takes a multiple-copy approach that is adaptive with node movements. Numerical results in mobile ad hoc networks and vehicular ad hoc networks show superior performance of the proposed protocol compared with other routing protocols. The mobility-aware media access control and routing scheme exhibits relatively small packet delivery delay and requires a modest amount of total packet replications/transmissions.  相似文献   

11.
A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most secure protocols in mobile ad hoc networks, such as secure routing, key agreement and secure group communication protocols, assume that all nodes must have pre‐shared a secret, or pre‐obtained public‐key certificates before joining the network. However, this assumption has a practical weakness for some emergency applications, because some nodes without pre‐obtained certificates will be unable to join the network. In this paper, a heterogeneous‐network aided public‐key management scheme for mobile ad hoc networks is proposed to remedy this weakness. Several heterogeneous networks (such as satellite, unmanned aerial vehicle, or cellular networks) provide wider service areas and ubiquitous connectivity. We adopt these wide‐covered heterogeneous networks to design a secure certificate distribution scheme that allows a mobile node without a pre‐obtained certificate to instantly get a certificate using the communication channel constructed by these wide‐covered heterogeneous networks. Therefore, this scheme enhances the security infrastructure of public key management for mobile ad hoc networks. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

12.
Efficient resource management is a major challenge in the operation of wireless systems, especially energy-constrained ad hoc networks. In this paper, we propose a cross-layer optimization framework to jointly design the scheduling and power control in wireless ad hoc networks. We study the system performance by combining scheduling, power control, and adaptive modulation. Specifically, the transmitted power and constellation size are dynamically adapted based on the packet arrival, quality of service (QoS) requirements, power limits, and channel conditions. A key feature of the proposed method is that it facilitates a distributed implementation, which is desirable in wireless ad hoc networks. The performance of our proposed methodology will be investigated in ad hoc networks supporting unicast as well as multicast traffic. Simulation results will show that the proposed scheme achieves significant gains in both the single-hop throughput and power efficiency compared with the existing method, which implements the scheduling through a central controller, and adopts power control with fixed modulation  相似文献   

13.
Mobility increases the capacity of ad hoc wireless networks   总被引:16,自引:0,他引:16  
The capacity of ad hoc wireless networks is constrained by the mutual interference of concurrent transmissions between nodes. We study a model of an ad hoc network where n nodes communicate in random source-destination pairs. These nodes are assumed to be mobile. We examine the per-session throughput for applications with loose delay constraints, such that the topology changes over the time-scale of packet delivery. Under this assumption, the per-user throughput can increase dramatically when nodes are mobile rather than fixed. This improvement can be achieved by exploiting a form of multiuser diversity via packet relaying.  相似文献   

14.
Joint scheduling and power control for wireless ad hoc networks   总被引:5,自引:0,他引:5  
In this paper, we introduce a cross-layer design framework to the multiple access problem in contention-based wireless ad hoc networks. The motivation for this study is twofold, limiting multiuser interference to increase single-hop throughput and reducing power consumption to prolong battery life. We focus on next neighbor transmissions where nodes are required to send information packets to their respective receivers subject to a constraint on the signal-to-interference-and-noise ratio. The multiple access problem is solved via two alternating phases, namely scheduling and power control. The scheduling algorithm is essential to coordinate the transmissions of independent users in order to eliminate strong levels of interference (e.g., self-interference) that cannot be overcome by power control. On the other hand, power control is executed in a distributed fashion to determine the admissible power vector, if one exists, that can be used by the scheduled users to satisfy their single-hop transmission requirements. This is done for two types of networks, namely time-division multiple-access (TDMA) and TDMA/code-division multiple-access wireless ad hoc networks.  相似文献   

15.

Secure and efficient group communication among mobile nodes is one of the significant aspects in mobile ad hoc networks (MANETs). The group key management (GKM) is a well established cryptographic technique to authorise and to maintain group key in a multicast communication, through secured channels. In a secure group communication, a one-time session key is required to be shared between the participants by using distributed group key agreement (GKA) schemes. Due to the resource constraints of ad hoc networks, the security protocols should be communication efficient with less overhead as possible. The GKM solutions from various researches lacks in considering the mobility features of ad hoc networks. In this paper, we propose a hexagonal clustered one round distributed group key agreement scheme with trust (HT-DGKA) in a public key infrastructure based MANET environment. The proposed HT-DGKA scheme guarantees an access control with key authentication and secrecy. The performance of HT-DGKA is evaluated by simulation analysis in terms of key agreement time and overhead for different number of nodes. Simulation results reveal that the proposed scheme guarantees better performance to secure mobile ad hoc network. It is demonstrated that the proposed scheme possesses a maximum of 2250 ms of key agreement time for the higher node velocity of 25 m/s and lower key agreement overhead. Also, the HT-DGKA scheme outperforms the existing schemes in terms of successful message rate, packet delivery ratio, level of security, computation complexity, number of round, number of exponentiations and number of message sent and received that contribute to the network performance.

  相似文献   

16.
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networks such as ad-hoc and sensor networks. In this paper, we develop a distributed rate control algorithm for multicast session in ad hoc networks. With random network coding, the algorithm can be implemented in a distributed manner, and work at transport layer to adjust source rates and at network layer to carry out network coding. The scheduling element of our algorithm is a dynamic scheduling policy. The stability of the resulted system is established, and simulation results are provided to support our conclusions.  相似文献   

17.
Cai  Zhijun  Lu  Mi  Wang  Xiaodong 《Telecommunication Systems》2003,22(1-4):281-297
Bandwidth-guaranteed QoS service in ad hoc networks is a challenging task due to several factors such as the absence of the central control, the dynamic network topology, the hidden terminal problem and the multihop routing property. An end-to-end bandwidth allocation algorithm was proposed in [Lin and Liu, 15] to support the QoS service in ad hoc networks. However, without exploring the global resource information along the route, the performance of that algorithm is quite limited. In addition, it also incurs significant control overhead. We develop a new algorithm for end-to-end bandwidth calculation and assignment in ad hoc networks which utilizes the global resource information along the route to determine the available end-to-end bandwidth. Our method also employs the topology-transparent scheduling technology to reduce the control overhead. The proposed algorithm can be efficiently utilized in a distributed manner. Both theoretical analysis and simulation results show that our end-to-end bandwidth allocation scheme can significantly improve the network capacity compared with the existing method.  相似文献   

18.
研究了一种能量受限的非可信中继与多用户分集技术相结合的两跳链路安全网络通信模型。为提升系统安全性能,本文采用混合时间-功率分配中继(time-power splitting-based relaying, TPSR)协议,并结合机会调度策略(opportunistic scheduling strategy, OSS)从多用户分集网络中选择一个最佳目的节点作为信息接收端。基于随机选择(random selection, RS)策略,该文中利用低复杂度的高斯Q函数分析系统的安全性能以及在协作中继上进行能量采集活动不中断的条件下推导了系统的遍历安全速率(ergodic secrecy rate, ESR)的近似闭合表达式。此外,将提出的OSS与RS通信方案下性能进行对比,证明本文所提出的OSS更适用于分布式多用户选择网络。   相似文献   

19.
Numerous directional medium access control (DMAC) protocols have been developed to enhance the capacity of ad hoc networks using the underlying advanced physical layer techniques, such as beam-forming, multiuser detection (MUD), and multiple-input–multiple-output (MIMO). In this paper, we propose an innovative fully distributed DMAC protocol that cooperatively makes use of polarization diversity in low-mobility urban/suburban outdoor wireless ad hoc network environment. In the proposed cooperative polarization DMAC protocol (CPDMAC), each node directionally senses on both vertical and horizontal polarizations and dynamically adapts polarization that minimizes overall interference in the ad hoc network. Analysis is performed to establish relationship between vertically and horizontally polarized nodes in the network. Further, a theoretical lower bound is derived for probability of successful transmission to show capacity improvement as a function of cross polarization ratio (CPR). Simulation results confirm from 2% up to 400% improvement in average node throughput at data rate of 1.95 Mbps when compared to the traditional DMAC protocol. Moreover, our study clearly shows that the average throughput difference increases with increasing node density when compared to the traditional DMAC protocol.  相似文献   

20.
This paper addresses issues concerned with design and managing of mobile ad hoc networks. We focus on self-organizing, cooperative and coherent networks that enable a continuous communication with a central decision unit and adopt to changes in an unknown environment to achieve a given goal. In general, it is very difficult to model a motion of nodes of a real-life ad hoc network. However, mobility modeling is a critical element that has great influence on the performance characteristics of a cooperative system. In this paper we investigate a novel approach to cooperative and fully connected networks design. We present an algorithm for efficient calculating of motion trajectories of wireless devices. Our computing scheme adopts two techniques, the concept of an artificial potential field and the concept of a particle-based mobility. The utility and efficiency of the proposed approach has been justified through simulation experiments. The results of presented case studies show a wide range of applications of our method starting from simple to more complex ad hoc networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号