首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A random access protocol with multiple receivers per mobile node for infrastructure-less mission critical wireless networking system is introduced and analyzed. Each receiver of a mobile node may receive a packet in the presence of collision depending on the receiver quality defined as capture ratio. The maximum throughput per mobile node depends exclusively on the number of receivers per node and the capture ratio. Since the maximum throughput is independent of the variable factors of the network, the network is self-optimized. The self-optimized throughput increases with the increase of the number of receivers per node and the quality of each receiver (defined as capture ratio). On the other hand, the cost per mobile node also increases with the increase of the number of receivers per node and the quality of each receiver. The trade-off between the self-optimized throughput per node and the cost per mobile node is analyzed. In mission critical networking system, most of the traffic may be the real-time traffic, where the number of retransmission attempts is limited. The normalized delay is almost constant if the number of retransmission attempts is more than eight. However, the packet rejection probability decreases with the increase of the number of retransmission attempts.  相似文献   

2.
Deployment of wireless relay nodes can enhance system capacity, extend wireless service coverage, and reduce energy consumption in wireless networks. Network coding enables us to mix two or more packets into a single coded packet at relay nodes and improve performances in wireless relay networks. In this paper, we succeed in developing analytical models of the throughput and delay on slotted ALOHA (S-ALOHA) and S-ALOHA with network coding (S-ALOHA/NC) for single-relay multi-user wireless networks with bidirectional data flows. The analytical models involve effects of queue saturation and unsaturation at the relay node. The throughput and delay for each user node can be extracted from the total throughput and delay by using the analytical models. One can formulate various optimization problems on traffic control in order to maximize the throughput, minimize the delay, or achieve fairness of the throughput or the delay. In particular, we clarify that the total throughput is enhanced in the S-ALOHA/NC protocol on condition that the transmission probability at the relay node is set at the value on the boundary between queue saturation and unsaturation. Our analysis provides achievable regions in throughput on two directional data flows at the relay node for both the S-ALOHA and S-ALOHA/NC protocols. As a result, we show that the achievable region in throughput can be enhanced by using network coding and traffic control.  相似文献   

3.
A Novel Distributed Scheduling Algorithm for Downlink Relay Networks   总被引:1,自引:0,他引:1  
To extend network coverage and to possibly increase data packet throughput, the future wireless cellular networks could adopt relay nodes for multi-hop data transmission. This letter proposes a novel distributed scheduling algorithm for downlink relay networks. Soft-information indicating the probability of activating each network link is exchanged iteratively among neighboring network nodes to determine an efficient schedule. To ensure collision-free simultaneous data transmissions, collision-avoiding local constraint rules are enforced at each network node. To increase resource utility, the soft-information is weighted according to the urgency of data transmission across each link, which also helps maintain throughput fairness among network users.  相似文献   

4.
This paper deals with two representative unbalanced traffic cases for two-hop wireless relay access systems employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded technology for capacity enhancement with multiple unicast and multisource multicast networks. We have analyzed the performance of network coding on a two-hop wireless relay access system employing the slotted ALOHA under a balanced bidirectional traffic. The relay nodes will generally undergo this unbalanced multidirectional traffic but the impact of this unbalanced traffic on network coding has not been analyzed. This paper provides closed-form expressions for the throughput and packet delay for two-hop unbalanced bidirectional traffic cases both with and without network coding even if the buffers on nodes are unsaturated. The analytical results are mainly derived by solving queueing systems for the buffer behavior at the relay node. The results show that the transmission probability of the relay node is a design parameter that is crucial to maximizing the achievable throughput of wireless network coding in slotted ALOHA on two-hop unbalanced traffic cases. Furthermore, we show that the throughput is enhanced even if the traffic at the relay node is unbalanced.  相似文献   

5.
The advanced technique of multiple beam antennas is recently considered in wireless networks to improve the system throughput by increasing spatial reuse, reducing collisions, and avoiding co‐channel interference. The usage of multiple beam antennas is similar to the concept of Space Division Multiple Access (SDMA), while each beam can be treated as a data channel. Wireless networks can increase the total throughput and decrease the transmission latency if the physical layer of a mobile node can support multirate capability. Multirate wireless networks incurs the anomaly problem, because low data rate hosts may influence the original performance of high data rate hosts. In this work, each node fits out multiple beam antennas with multirate capability, and a node can either simultaneously transmit or receive multiple data on multiple beams. Observe that the transmitting or receiving operation does not happen at the same time. In this paper, we propose a multiple relay‐based medium access control (MAC) protocol to improve the throughput for low data rate hosts. Our MAC protocol exploits multiple relay nodes and helps the source and the destination to create more than one data channel to significantly reduce the transmission latency. Observe that low data rate links with long‐distance transmission latencies are distributed by multiple relay nodes, hence the anomaly problem can be significantly alleviated. In addition, the ACK synchronization problem is solved to avoid the condition that source nodes do not receive ACKs from destination nodes. An adjustment operation is presented to reduce unnecessary relay nodes during the fragment burst period. Finally, simulation results illustrate that our multiple relay‐based MAC protocol can achieve high throughput and low transmission latency. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

6.
Enabling multipacket reception (MPR) at the physical layer is a promising way to achieve higher bandwidth efficiency while reducing the complexity of the medium access control layer in distributed wireless networks. We study distributed probabilistic access where transmitting nodes access the shared wireless medium with a probability based on the node’s information about the aggregate traffic carried by the network. We model bursty traffic by rate-controlled two-state Markov sources and introduce a parameter that describes the “burstiness” level of the offered traffic. A throughput-optimal medium access strategy utilizing limited feedback is then described and its performance is examined for traffic with different levels of burstiness. It is shown that the bursty nature of the traffic in data networks allows for improvement of the bandwidth efficiency. Bounds on the system throughput are proposed and the queuing delay is analyzed.  相似文献   

7.
In this paper we propose high throughput collision free, mobility adaptive and energy efficient medium access protocol (MAC) called Collision Free Mobility Adaptive (CFMA) for wireless sensor networks. CFMA ensures that transmissions incur no collisions, and allows nodes to undergo sleep mode whenever they are not transmitting or receiving. It uses delay allocation scheme based on traffic priority at each node and avoids allocating same backoff delay for more than one node unless they are in separate clusters. It also allows nodes to determine when they can switch to sleep mode during operation. CFMA for mobile nodes provides fast association between the mobile node and the cluster coordinator. The proposed MAC performs well in both static and mobile scenarios, which shows its significance over existing MAC protocols proposed for mobile applications. The performance of CFMA is evaluated through extensive simulation, analysis and comparison with other mobility aware MAC protocols. The results show that CFMA outperforms significantly the existing CSMA/CA, Sensor Mac (S-MAC), Mobile MAC (MOB-MAC), Adaptive Mobility MAC (AM-MAC), Mobility Sensor MAC (MS-MAC), Mobility aware Delay sensitive MAC (MD-MAC) and Dynamic Sensor MAC (DS-MAC) protocols including throughput, latency and energy consumption.  相似文献   

8.
基于OLSR的Ad Hoc网络功率意识路由协议   总被引:2,自引:1,他引:1  
针对Ad Hoc网络能量受限的特点,提出了一种基于OLSR的功率意识路由协议.该协议的路由选择策略考虑节点发射功率和剩余寿命,同时尽量选择寿命较长的节点作为MPR节点.针对网络流量的突发性和随机性,采用基于能量流失率的节点寿命预测模型.在兼顾传统路由指标之外,主要考虑数据分组传输成功率和网络维持时间等参数.仿真结果显示,该算法有效地提高了网络吞吐量,延长了网络寿命.  相似文献   

9.
A privacy-preserving secure communication in ad hoc (without infrastructure) mission critical wireless networking system suitable for unmanned aerial vehicle communication systems is introduced and analyzed. It is expected that in a critical condition, few ad hoc (without infrastructure) mission critical wireless networking systems will work together. To make the simple and low cost privacy-preserving secure communication among the same network, each transmitting mobile node generates packets in such a way that its wanted receiving mobile nodes can read the message packets easily. On the other hand, the unwanted receiving mobile nodes from other networks cannot read those message packets. In addition, the unwanted receiving mobile nodes receive ‘jamming packets’ if they try to read them. This mechanism prevents the malicious receivers (readers from other networks) from reading the packets and obtaining information from this network. Results show that the throughput is very high and does not detect any jamming packets, if the receiving nodes of a network try to read packets transmitted by the nodes from the same networks.  相似文献   

10.
Transmission Range Effects on AODV Multicast Communication   总被引:3,自引:0,他引:3  
As laptop computers begin to dominate the marketplace, wireless adapters with varying bandwidth and range capabilities are being developed by hardware vendors. To provide multihop communication between these computers, ad hoc mobile networking is receiving increasing research interest. While increasing a node's transmission range allows fewer hops between a source and destination and enhances overall network connectivity, it also increases the probability of collisions and reduces the effective bandwidth seen at individual nodes. To enable formation of multihop ad hoc networks, a routing protocol is needed to provide the communication and route finding capability in these networks. The Ad hoc On-Demand Distance Vector Routing protocol (AODV) has been designed to provide both unicast and multicast communication in ad hoc mobile networks. Because AODV uses broadcast to transmit multicast data packets between nodes, the transmission range plays a key role in determining the performance of AODV. This paper studies the effects of transmission range on AODV's multicast performance by examining the results achieved at varying transmission ranges and network configurations.  相似文献   

11.
Broadcast capacity of wireless networks   总被引:2,自引:0,他引:2  
We present an upper bound on the broadcast capacity of arbitrary ad hoc wireless networks. The throughput obtainable by each node for broadcasting to-all-of the other nodes in a network consisting of n nodes with- fixed transmission ranges and C bits per second channel capacity is bounded by O(C/n), which is equivalent to the upper bound for per node capacity of a fully connected single-hop network.  相似文献   

12.
Hekmat  R.  Van Mieghem  P. 《Wireless Networks》2004,10(4):389-399
In this paper we propose a new model to calculate interference levels in wireless multi-hop ad-hoc networks. This model computes the expected value of Carrier to Interference ratio (C/I) by taking into account the number of nodes, density of nodes, radio propagation aspects, multi-hop characteristics of the network, and the amount of relay traffic. The expected values of C/I are used to determine network capacity and data throughput per node. Our model uses a regular lattice for possible locations of mobile nodes. This enables us to calculate the expected values of C/I, without having detailed information about movement patterns and exact location of all nodes at any moment. Based on this model we have evaluated effects of variations in the network size, network density and traffic load on C/I, and consequently throughput of the network. Our calculations suggest that interference is upper-bounded in wireless ad-hoc networks that use carrier sensing for medium access control. Further, from the point of view of throughput optimization, our calculations show limits on the network size and input data rates per node.  相似文献   

13.
In mesh networks architecture, it should be permitted to visit the mobile client points. Whereas in mesh networks environment, the main throughput flows usually communicate with the conventional wired network. The so‐called gateway nodes can link directly to traditional Ethernet, depending on these mesh nodes, and can obtain access to data sources that are related to the Ethernet. In wireless mesh networks (WMNs), the quantities of gateways are limited. The packet‐processing ability of settled wireless nodes is limited. Consequently, throughput loads of mesh nodes highly affect the network performance. In this paper, we propose a queuing system that relied on traffic model for WMNs. On the basis of the intelligent adaptivenes, the model considers the influences of interference. Using this intelligent model, service stations with boundless capacity are defined as between gateway and common nodes based on the largest hop count from the gateways, whereas the other nodes are modeled as service stations with certain capacity. Afterwards, we analyze the network throughput, mean packet loss ratio, and packet delay on each hop node with the adaptive model proposed. Simulations show that the intelligent and adaptive model presented is precise in modeling the features of traffic loads in WMNs. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

14.
一种新的基于多包接收的ad hoc网络媒体接入算法   总被引:4,自引:0,他引:4  
李廉  杨震 《通信学报》2004,25(8):59-66
多包接收技术在无线网络中的应用为提高网络吞吐量提供了一种新思路。本文在结合多包接收技术的基础上提出了一种应用于ad hoc网络的新的媒体接入控制算法,并对其吞吐量作了分析,与IEEE802.11MAC接入方式进行了性能比较。仿真结果表明,在业务量大于某一特定值时,新算法可以显著的提高ad hoc网络的吞吐量。  相似文献   

15.
The connectivity properties of a mobile linear network with high speed mobile nodes and strict delay constraint are investigated. A new mobility model is developed to represent the steady state node distribution, and it accurately captures the statistical properties of random node arrival, time-varying node speed, and the distinct behaviors of nodes following different traffic patterns.With the mobility model, the statistical properties of network connectivity are studied and identified. Unlike most previous works that do not consider the impacts of transmission latency, which is critical for real time applications, this paper identifies the quantitative relationship between network connectivity and delay constraint. The results are applicable to both delay constrained networks and delay tolerant networks. The connectivity analysis is performed with a novel geometry-assisted analytical method. Exact connectivity probability expressions are developed by using the volumes of a hypercube intersected by a hyperplane, and a hyperpyramid. The geometry-assisted analytical method significantly simplifies the connectivity analysis.  相似文献   

16.
An adaptive medium-access control (MAC) protocol for heterogeneous networks with finite populations is proposed. Referred to as the multiqueue service room (MQSR) protocol, this scheme is capable of handling users with different quality-of-service (QoS) constraints. By exploiting the multipacket reception (MPR) capability, the MQSR protocol adaptively grants access to the MPR channel to a number of users such that the expected number of successfully received packets is maximized in each slot. The optimal access protocol avoids unnecessary empty slots for light traffic and excessive collisions for heavy traffic. It has superior throughput and delay performance as compared to, for example, the slotted ALOHA with optimal retransmission probability. This protocol can be applied to random-access networks with multimedia traffic.  相似文献   

17.
A new medium access protocol which exploits the physical layer capability of multiuser detection is proposed to help in improving the throughput/delay performance of ad-hoc networks. When more than one node has packets buffered for a common node in the neighborhood, all such nodes can simultaneously transmit their packets to the common receiver after reserving their surrounding channel. This is achieved in our protocol by extending the (sender-initiated) CSMA/CA collision avoidance framework by the receiver-initiated medium access technique and incorporating the transmission power control. We analyze the improvement in the throughput that can be achieved over the basic sender-initiated collision avoidance protocol in the network. Since the throughput improvement via multi-packet reception is influenced by the network layer activity as well, the performance of our protocol rolls back to that of the basic sender-initiated protocol in case of no coordination from the network layer. For the evaluation of performance of our protocol we simulate ad-hoc networks for different network topologies and traffic configurations. We observe the scheme to be capable in significantly improving the throughput/delay performance of the network.  相似文献   

18.
The MACORA is presented to solve the collision between mobile agent and multicast suppression in channel competitive process. With two-layer graph model, the channel converter problem in the dual-channel wireless sensor networks can be simplified into a routing problem over the two-layered graph, so we can search for routes in the control plane and transport traffic in the data plane synchronously. Then, the control plane and the data plane are integrated into a two-layered network, and searching for route for each traffic in the two-layer networks synchronously. The MACORA can make full use of the idle resource in different layers, this strategy deals with the collision between mobile agent and multicast suppression in channel competitive process well, so the blocking probability of networks and the error rate of packet transmission can be cut down. Simulation results show that the MACORA performs better in improving success rate of packet transmission.  相似文献   

19.
针对水下无线传感器网络(UWSN,underwater sensor networks)提出以发送端为中心以连续时间为计量单位的冲突状态模型——局部冲突状态图及其分布式构建算法,并在此基础上设计了基于启发式规则的水下传感器网络TDMA协议(CT-TDMA,continuous time based TDMA)。CT-TDMA利用UWSN中同一接收节点与不同发送节点之间链路时延的差异性,减少在目的端的接收帧之间的空闲时间,从而提高网络流量;基于启发式规则的分配算法,能有效缩短连续时间轴上的时刻分配所花费的时间。模拟实验证明:CT-TDMA与以ST-MAC为代表的按时隙分配的TDMA方案相比,网络流量提高了20%,数据分组的端到端时延降低了18%;与由全局知识所计算出的最优分配策略相比,网络流量达到了80%,端到端时延仅延长了12%。  相似文献   

20.
An energy capture cooperative relay network was studied.Unlike traditional cooperative relay networks,the relay nodes generally did not have a fixed energy supply but could carry out energy capture.For this network,a natural question was how to determine whether the relay nodes perform energy capture or data forwarding,and how to select the relay node to assist the information transmission between the source node and the destination node.Based on this problem,a multi-relay node selection scheme was proposed,which select the operation according to the energy of the current time slot of the relay node.In each time slot,the relay node that meet the battery threshold requirements was selected to assist in transmission.The Markov chain was used to model the charging and discharging process of the relay node battery,and the probability of interruption and throughput of the wireless network was obtained.And the value of the battery threshold when the throughput was maximized,that is,when the probability of network breakage was minimum was solved.Finally,the advantages of this scheme were verified by numerical experiments.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号