共查询到20条相似文献,搜索用时 16 毫秒
2.
This paper proposes an analytical modeling framework to investigate multipath routing in multihop mobile ad hoc networks.
In this paper, a more generalized system has been considered and mathematically analyzed to observe some of the related performance
measures of the ad hoc network. Each node in the network is assumed to have finite buffer. The single-path model is approximated
to be a multi-node M/M/1/B tandem network, and the multi-path model as a set of multiple parallel paths. This proposed model
allows us to investigate issues such as end-to-end delivery delay, throughput and routing reliability in mobile ad hoc networks.
Theoretical results have been verified by numerical results. An optimal path selection strategy has been proposed to select
a minimized delay path among the available multiple paths between source-destination pair. 相似文献
3.
One wireless network architecture that has received a lot of attention recently is the mobile ad hoc network (MANET). It is attractive because the network can be quickly deployed without the infrastructure of base stations. One main feature of MANET is that mobile hosts may communicate with each other through a sequence of wireless links (i.e., in a multihop manner). While many routing protocols have been proposed for MANET by considering criteria such as length, quality, bandwidth, and signal strength [S. Agarwal et al., 2000], [D.B. Johnson et al., 2000], [R. Dube et al., Feb. 1997], [Z. Haas and M. Pearlman, 2000], [M. Jiang et al., 1998], [C. Perkins and P. Bhagwat, Sept. 1994], the issue of route lifetime has not been addressed formally. This paper presents a formal model to predict the lifetime of a routing path based on the random walk model. Route lifetime is derived based on a probabilistic model. Through such investigation, we hope to provide further insight into issues such as route selection, route maintenance, and network scalability related to MANETs. 相似文献
4.
Future mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access control (MAC) in such networks. User mobility presents unique difficulties in this context due to the associated dynamic path attenuation. In this paper, a MAC scheme for mobile ad hoc networks supporting voice traffic is proposed. With the aid of a low‐power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, thus leading to small packet transmission delay and jitter. The proposed scheme can automatically adapt to dynamic path attenuation in a mobile environment. Statistical multiplexing of on/off voice traffic can also be achieved by partial resource reservation for off voice flows. Simulation results demonstrate the effectiveness of the proposed scheme. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
5.
In spite of the massive efforts in researching and developing mobile ad hoc networks in the last decade, this type of network has not yet witnessed mass market deployment. The low commercial penetration of products based on ad hoc networking technology could be explained by noting that the ongoing research is mainly focused on implementing military or specialized civilian applications. On the other hand, users are interested in general-purpose applications where high bandwidth and open access to the Internet are consolidated and cheap commodities. To turn mobile ad hoc networks into a commodity, we should move to more pragmatic "opportunistic ad hoc networking" in which multihop ad hoc networks are not isolated self-configured networks, but rather emerge as a flexible and low-cost extension of wired infrastructure networks coexisting with them. Indeed, a new class of networks is emerging from this view: mesh networks. This article provides an overview of mesh networking technology. In particular, starting from commercial case studies we describe the core building blocks and distinct features on which wireless mesh networks should be based. We provide a survey of the current state of the art in off-the-shelf and proprietary solutions to build wireless mesh networks. Finally, we address the challenges of designing a high-performance, scalable, and cost-effective wireless mesh network. 相似文献
7.
Location-based routing protocols are stateless since they rely on position information in forwarding decisions. However, their efficiency depends on performance of location services which provide the position information of the desired destination node. Several location service schemes have been proposed, but the most promising among them, hierarchical hashing-based protocols, rely on intuitive design in the published solutions. In this paper, we provide full analysis of the efficiency of routing in hierarchical hashing-based protocols as a function of the placement of the routers. Based on the theoretical analysis of the gain and costs of the query and reply routing, we propose a novel location service protocol that optimizes the distance traveled by the location update and query packets and, thus, reduces the overall energy cost. These gains are further increased in the second presented protocol by the optimal location of servers that we established through analysis of geometrical relationships between nodes and location servers. Simulation results demonstrate that the proposed protocols achieve around 30–35% energy efficiency while improving or maintaining the query success rate in comparison to the previously proposed algorithms. 相似文献
8.
Due to complicated situations such as node/link interference and traffic load, quality of service support in multi-hop multi-rate ad hoc networks remains a challenging issue. Furthermore, when mobility is present, because of frequent route change, it is even more difficult to maintain high level performance for existing real-time flows that may not tolerate serious performance degradation. In this paper, we focus on the issue of providing sufficient QoS in networks with moderate to high node mobility. We first introduce route available bandwidth (RAB), a major index for prediction of flow performance along a specific path. RAB considers various important factors such as intra-flow interference, effective link bandwidth, and channel busy time. Then, we devise a DSR based admission control scheme where the source node accepts/rejects a flow according to the RAB of the collected route when it receives a route reply packet. To handle mobility, we incorporate an additional metric of route reliability (RR) so that a path with sufficient bandwidth and reliability can be obtained. Results show that with admission control, existing flows experiences around 80–95% average delivery ratio, even for 20 m/s maximum moving speed, which is much better than 30–60% average delivery ratio when admission control is absent. 相似文献
9.
This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks.The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology.The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS.The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides. 相似文献
11.
Transport protocol design for supporting multimedia streaming in mobile ad hoc networks is challenging because of unique issues, including mobility-induced disconnection, reconnection, and high out-of-order delivery ratios; channel errors and network congestion. In this paper, we describe the design and implementation of a transmission control protocol (TCP)-friendly transport protocol for ad hoc networks. Our key design novelty is to perform multimetric joint identification for packet and connection behaviors based on end-to-end measurements. Our NS-2 simulations show significant performance improvement over wired TCP friendly congestion control and TCP with explicit-link-failure-notification support in ad hoc networks. 相似文献
12.
Bluetooth scatternets, integrating polling, and frequency hopping spread-sprectrum in their medium access control protocol, provide a contention-free environment for Bluetooth devices to access the medium and communicate over multihop links. Currently, most available scatternet formation protocols tend to interconnect all Bluetooth devices at the initial network startup stage and maintain all Bluetooth links thereafter. Instead of this "big scatternet" approach, we propose a scatternet-route structure to combine the scatternet formation with on-demand routing, thus eliminating unnecessary link and route maintenances. To the best of our knowledge, this is the first effort to address on-demand scatternet formation with every detail. We introduce an extended ID (EID) connectionless broadcast scheme, which, compared with original Bluetooth broadcast mechanism, achieves very much shortened route discovery delay. We also propose to synchronize the piconets along each scatternet route to remove piconet switch overhead and obtain even better channel utilization. Furthermore, we present a route-based scatternet scheduling scheme to enable fair and efficient packet transmissions over scatternet routes. Network performance analysis and simulations show that scatternet routes can provide multihop wireless channels with high network utilization and extremely stable throughput, being especially useful in the transmission of large batches of packets and real time data in wireless environment. 相似文献
15.
A new protocol, called family ACK tree (FAT), is proposed to support a reliable multicast service for mobile ad hoc networks. For each reliable multicast protocol, a recovery scheme is used to ensure end-to-end delivery of unreliable multicast packets for all group members. FAT employs a tree-based recovery mechanism that localizes ACKs and retransmissions to avoid feedback implosion. To cope with node movements, FAT constructs an ACK tree on which each node maintains reachability information to three generations of nodes on the ACK tree. When a tree is fragmented due to a departed node, the fragments are glued back to the tree using the underlying multicast routing protocol. FAT then adopts an adaptive scheme to recover missed packets that have been multicast to the group during fragmentation and are not repaired by the new reliability agent. We have conducted simulations to compare the performance of FAT with existing solutions. The results show that FAT achieves better performance for the provision of reliable service in ad hoc networks, in terms of reliability, scalability, and delivery efficiency. 相似文献
16.
Transport connections set up in wireless ad hoc networks are plagued by problems such as high bit error rates, frequent route changes, and partitions. If we run the transmission control protocol (TCP) over such connections, the throughput of the connection is observed to be extremely poor because TCP treats lost or delayed acknowledgments as congestion. We present an approach where we implement a thin layer between Internet protocol and standard TCP that corrects these problems and maintains high end-to-end TCP throughput. We have implemented our protocol in FreeBSD, and we present results from extensive experimentation done in an ad hoc network. We show that our solution improves the TCP's throughput by a factor of 2-3 相似文献
17.
Vehicular communication networking is a promising approach to facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this article we first review the current standardization process, which covers the methods of providing security services and preserving driver privacy for wireless access in vehicular environments (WAVE) applications. We then address two fundamental issues, certificate revocation and conditional privacy preservation, for making the standards practical. In addition, a suite of novel security mechanisms are introduced for achieving secure certificate revocation and conditional privacy preservation, which are considered among the most challenging design objectives in vehicular ad hoc networks. 相似文献
18.
In mobile ad hoc networks nodes should collaborate with each other to support the functions of the network. The trust management framework, which evaluates the trust of participating nodes, is used to force nodes to cooperate in a normal way. We make an effort to design a robust and attack-resistant trust management framework for the future. In this article we describe the vulnerabilities of and possible attacks on existing frameworks. An objective trust management framework is proposed to overcome these vulnerabilities. We provide a theoretical basis and skeleton for this framework. The performance evaluation and security analysis are provided showing the effectiveness and robustness of the OTMF compared with existing frameworks. 相似文献
19.
Existing position-based unicast routing algorithms which forward packets in the geographic direction of the destination require that the forwarding node knows the positions of all neighbors in its transmission range. This information on direct neighbors is gained by observing beacon messages each node sends out periodically. Due to mobility, the information that a node receives about its neighbors becomes outdated, leading either to a significant decrease in the packet delivery rate or to a steep increase in load on the wireless channel as node mobility increases. In this paper, we propose a mechanism to perform position-based unicast forwarding without the help of beacons. In our contention-based forwarding scheme (CBF) the next hop is selected through a distributed contention process based on the actual positions of all current neighbors. For the contention process, CBF makes use of biased timers. To avoid packet duplication, the first node that is selected suppresses the selection of further nodes. We propose three suppression strategies which vary with respect to forwarding efficiency and suppression characteristics. We analyze the behavior of CBF with all three suppression strategies and compare it to an existing greedy position-based routing approach by means of simulation with ns-2. Our results show that CBF significantly reduces the load on the wireless channel required to achieve a specific delivery rate compared to the load a beacon-based greedy forwarding strategy generates. 相似文献
|