首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
无线自组织网络MAC调度技术研究*   总被引:2,自引:0,他引:2  
从提高无线自组织网络服务质量的角度出发,介绍了无线自组织网络MAC调度技术的研究动机和技术本质。从无线干扰模型的建立、集中式与分布式调度算法的设计、调度复杂性理论、集中式和分布式调度算法的性能比较、拓扑透明MAC调度技术这五个相关研究方向入手,全面介绍了无线自组织网络MAC调度技术的研究进展和当前面临的挑战,并讨论了未来可能的发展方向。  相似文献   

2.
We consider the problem of assuring the trustworthiness (i.e. reliability and robustness) and prolonging the lifetime of wireless ad hoc networks, using the OLSR routing protocol, in the presence of selfish nodes. Assuring the trustworthiness of these networks can be achieved by selecting the most trusted paths, while prolonging the lifetime can be achieved by (1) reducing the number of relay nodes (MPR) propagating the topology control (TC) messages and (2) considering the residual energy levels of these relay nodes in the selection process. In this paper, we propose a novel clustering algorithm and a relay node selection algorithm based on the residual energy level and connectivity index of the nodes. This hybrid model is referred to as H-OLSR. The OLSR messages are adapted to handle the cluster heads election and the MPR nodes selection algorithms. These algorithms are designed to cope with selfish nodes that are getting benefits from others without cooperating with them. Hence, we propose an incentive compatible mechanism that motivates nodes to behave truthfully during the selection and election processes. Incentive retributions increase the reputation of the nodes. Since network services are granted according to nodes’ accumulated reputation, the nodes should cooperate. Finally, based on nodes’ reputation, the most trusted forwarding paths are determined. This reputation-based hybrid model is referred to as RH-OLSR. Simulation results show that the novel H-OLSR model based on energy and connectivity can efficiently prolong the network lifetime, while the RH-OLSR model improves the trustworthiness of the network through the selection of the most trusted paths based on nodes’ reputations. These are the two different processes used to define the reputation-based clustering OLSR (RBC-OLSR) routing protocol.  相似文献   

3.
This paper describes a scalable key management and clustering scheme for secure group communications in ad hoc and sensor networks. The scalability problem is solved by partitioning the communicating devices into subgroups, with a leader in each subgroup, and further organizing the subgroups into hierarchies. Each level of the hierarchy is called a tier or layer. Key generation, distribution, and actual data transmissions follow the hierarchy. The distributed, efficient clustering approach (DECA) provides robust clustering to form subgroups, and analytical and simulation results demonstrate that DECA is energy-efficient and resilient against node mobility. Comparing with most other schemes, our approach is extremely scalable and efficient, provides more security guarantees, and is selective, adaptive and robust.  相似文献   

4.
Ultra wideband (UWB) systems are currently an important wireless infrastructure for high performance short-range communications and mobile applications. Indeed, forming ad-hoc networks among various UWB enabled devices is considered as an important mobile data exchange operating environment. In our study, we explore the problem of jointly optimizing the power level and data rate used in the devices in such a UWB based ad-hoc network. We propose a practical optimization algorithm based on judicious power control for real-time applications and opportunistic scheduling for non-real-time applications. Simulation results indicate that our proposed techniques are effective under various practical scenarios.
Yu-Kwong KwokEmail:
  相似文献   

5.
This paper studies a challenging problem of cache placement in wireless multi-hop ad hoc networks. More specifically, we study how to achieve an optimal tradeoff between total access delay and caching overheads, by properly selecting a subset of wireless nodes as cache nodes when the network topology changes. We assume a data source updates a data item to be accessed by other client nodes. Most of the existing cache placement algorithms use hop counts to measure the total cost of a caching system, but hop delay in wireless networks varies much due to the contentions among these nodes and the traffic load on each link. Therefore, we evaluate the per-hop delay for each link according to the contentions detected by a wireless node from the MAC layer. We propose two heuristic cache placement algorithms, named Centralized Contention-aware Caching Algorithm (CCCA) and Distributed Contention-aware Caching Algorithm (DCCA), both of which detect the variation of contentions and the change of the traffic flows, in order to evaluate the benefit of selecting a node as a cache node. We also apply a TTL-based cache consistency strategy to maintain the delta consistency among all the cache nodes. Simulation results show that the proposed algorithms achieve better performance than other alternative ones in terms of average query delay, caching overheads, and query success ratio.  相似文献   

6.
This paper presents a scheme that employs TCP-aware network coding with opportunistic scheduling to enhance TCP throughput in wireless mobile ad hoc networks. Specifically, it considers a TCP parameter, congestion window size, and wireless channel conditions simultaneously to improve TCP throughput performance. Evaluation of this scheme is carried out by using ns2 simulations in different scenarios. The results show that the proposed scheme gives approximately 35% throughput improvement in a high mobility environment and about 33% throughput increase in no or low mobility environment as compared to traditional network coding with opportunistic scheduling. This paper also proposes a new adaptive-W (i.e., adaptive Waiting time) scheme whose objective is to adaptively control waiting time of overheard packets that are stored in a buffer to achieve tradeoff between throughput and overhead.  相似文献   

7.
Jun  Hung Keng   《Computer Networks》2005,48(6):867-890
It is an undisputed fact that fairness is an important element of a well-designed medium access control (MAC) protocol for multi-hop ad hoc networks. However, most popular MAC protocols still fail to attain an acceptable level of fairness in media access although several enhancements have been proposed in the past. These proposed enhancements are effective only in limited scenarios. It is our objective in this paper to do the following: (i) analyze the fairness problem; (ii) identify and analyze the three main causes leading to the fairness problem, namely, the lack of synchronization problem (LSP), the double contention areas problem (DCP) and the lack of coordination problem (LCP); (iii) based on the analysis, propose a new MAC protocol named the extended hybrid asynchronous time division multiple access (EHATDMA) as a solution. For better assessment of fairness, we have designed an index named max–min fairness index, which is scenario-independent and reflects the difference between the fair sharing provided by a protocol and the ideal max–min fair sharing. Comprehensive simulations have been carried out to compare the fairness of our protocol with the existing ones. Simulation results show that although the existing protocols employ various enhancements meant to improve the fairness property, most of them are still strongly biased towards throughput when a conflict between throughput and fairness arises. In addition, the fairness performance of these protocols varies widely from one scenario to another. On the other hand, EHATDMA strikes a good balance between throughput and fairness. It delivers a consistently high level of fairness regardless of network topology, traffic load and radio parameters, yet maintains high throughput whenever possible. Our simulation results also reveal that the most important mechanism affecting the fair sharing of radio channels among flows is the non-work-conserving mechanism.  相似文献   

8.
Motivated by cooperative communication in ad hoc networks, Wu et al. proposed extended dominating set (EDS) where each node in an ad hoc network is covered by either a dominating neighbor or several 2-hop dominating neighbors, and defined two types of dominating sets: extended strongly connected dominating set (ECDS) and extended weakly connected dominating set (EWCDS), according to the success of a broadcast process. An EWCDS is an effective method for clustering. In this paper, we extend the dominative capabilities of nodes such that each forward node dominates not only itself and its regular neighbors fully, but also its quasi-neighbors partly. Based on this extension, three novel algorithms to find EWCDSs in ad hoc networks are proposed. The correctness and performance of our algorithms are confirmed through theoretical analysis and comprehensive simulations.  相似文献   

9.
We present a new approach, the GeoQuorums approach, for implementing atomic read/write shared memory in mobile ad hoc networks. Our approach is based on associating abstract atomic objects with certain geographic locations. We assume the existence of focal points, geographic areas that are normally “populated” by mobile nodes. For example, a focal point may be a road junction, a scenic observation point, or a water resource in the desert. Mobile nodes that happen to populate a focal point participate in implementing a shared atomic object, using a replicated state machine approach. These objects, which we call focal point objects, are prone to occasional failures when the corresponding geographic areas are depopulated. The GeoQuorums algorithm uses the fault-prone focal point objects to implement atomic read/write operations on a fault-tolerant virtual shared object. The GeoQuorums algorithm uses a quorum-based strategy in which each quorum consists of a set of focal point objects. The quorums are used to maintain the consistency of the shared memory and to tolerate limited failures of the focal point objects, which may be caused by depopulation of the corresponding geographic areas. We present a mechanism for changing the set of quorums on the fly, thus improving efficiency. Overall, the new GeoQuorums algorithm efficiently implements read and write operations in a highly dynamic, mobile network.  相似文献   

10.
One of the key challenges for ad hoc networks is providing distributed membership control. This paper introduces a self-organized mechanism to control user access to ad hoc networks without requiring any infrastructure or a central administration entity. Our mechanism authenticates and monitors nodes with a structure that we call controller set, which is robust to the dynamic network membership. We develop analytical models for evaluating the proposal and validate them through simulations. The analysis shows that the proposed scheme is robust even to collusion attacks and provides availability up to 90% better than proposals based on threshold cryptography. The performance improvement arises mostly from the controller sets capability to recover after network partitions and from the identification and exclusion of malicious nodes.  相似文献   

11.
在无线Ad Hoc网络路由协议中引入功率控制不但可以降低网络能量消耗,同时还能改善网络的吞吐量、投递率等性能,已成为当前Ad Hoc网络的一个研究热点.本文提出了一种基于跨层功率控制的按需路由算法CPC-AODV(Cross-layer Power Control Ad hoc On-demand Distance Vector).算法按需建立多个不同功率级的路由,节点选择到目的节点最小功率级的路由来传递分组,并对网络层的数据分组、路由分组和MAC层控制帧的传输采用不同功率控制策略来降低能量消耗.仿真结果表明:算法有利于降低通信能量开销,延长网络寿命,提高网络投递率及改善网络时延.  相似文献   

12.
Most reported works on transmission scheduling algorithm for multiple input multiple output (MIMO) link ad hoc networks do not fully exploit the spatial multiplexing potential inherent to multiple an-tennas system.In this paper,a novel transmission scheduling algorithm is proposed to further enhance the performance of MIMO link ad hoc networks.By utilizing the MIMO multi-stream reception capabilities and ordering the nodes’ allocation sequence,the proposed algorithm can dramatically shorten the scheduling frame length and more evenly distribute the data streams allocated to the network nodes.Meanwhile,allowing the nodes to transmit multiple streams in a slot,the algorithm can fully exploit the MIMO spatial multiplexing potential.Additionally,we give the theoretical analysis to quantify the throughput and delay performance with respect to this scheme.Numerical results demonstrate that the proposed algorithm can efficiently enhance the network throughput and reduce the average and maximum delay.  相似文献   

13.
14.
Deying  Qin  Xiaodong  Xiaohua   《Computer Communications》2007,30(18):3746-3756
In this paper, we discuss the energy efficient multicast problem in ad hoc wireless networks. Each node in the network is assumed to have a fixed level of transmission power. The problem of our concern is: given an ad hoc wireless network and a multicast request, how to find a multicast tree such that the total energy cost of the multicast tree is minimized. We first prove this problem is NP-hard and it is unlikely to have an approximation algorithm with a constant performance ratio of the number of nodes in the network. We then propose an algorithm based on the directed Steiner tree method that has a theoretically guaranteed approximation performance ratio. We also propose two efficient heuristics, node-join-tree (NJT) and tree-join-tree (TJT) algorithms. The NJT algorithm can be easily implemented in a distributed fashion. Extensive simulations have been conducted to compare with other methods and the results have shown significant improvement on energy efficiency of the proposed algorithms.  相似文献   

15.
Chien-Min   《Computer Communications》2007,30(18):3832-3840
A good channel assignment scheme in a multihop ad hoc network should not only guarantee successful data transmissions without collisions but also enhance the channel spatial reuse to maximize the system throughput. From the channel assignment schemes in time division multiple access (TDMA) slot assignment protocols developed in previous studies, we have found that these protocols do not have a convenient frame length shrink scheme after the expansion of the frame length. As the network size grows, the frame length expands quickly, particularly when we set the frame length as a power of two. A very long frame may result in poor channel utilization when it contains many unused slots. In this paper, we propose a dynamic frame length expansion and recovery method called dynamic frame length channel assignment (DFLCA). This strategy is designed to make better use of the available channels by taking advantage of the spatial reuse concept. In DFLCA, the increase in the spatial reuse is achieved by adding certain amount of control overhead. We show that the bandwidth saved due to the channel spatial reuse is larger than the additional bandwidth spent on the control overhead.  相似文献   

16.
针对MIMO链路ad hoc网络中已有传输调度算法未充分利用MIMO空间复用能力的问题,提出了一种新的传输调度算法.该算法通过考虑MIMO的多流接收能力而有效地减小了调度帧长,通过合理安排节点分配顺序使得节点分配的数据流比较平均,同时,该算法通过允许节点发送多个数据流而高效利用了MIMO的空间复用能力.推导分析了传输调度算法的通过量和时延性能,结果表明,与已有算法相比,采用文中算法可以提高网络的通过量,减小网络的平均时延和最大时延.  相似文献   

17.
对Adhoc网络中MAC协议的研究是一个比较新的领域,正在引起人们的广泛关注.MAC协议的重要性来源于无线信道的一些有别于有线信道的特征,例如:隐藏终端、暴漏终端、信号衰落.目前已经提出了一些MAC设计方案,但这些方案都是孤立存在的,为了能从整体上了解MAC协议发展现状,对现有的MAC协议进行了归类并且对它们进行了简单描述,作为结论,给出了MAC协议的发展方向.  相似文献   

18.
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports self-configuration and self-management. Efficient clustering protocol for constructing virtual backbone is becoming one of the most important issues in wireless ad hoc networks. The weakly connected dominating set   (WCDS) is very suitable for cluster formation. As finding the minimum WCDS in an arbitrary graph is a NP-Hard problem, we propose an area-based distributed algorithm for WCDS construction in wireless ad hoc networks with time and message complexity O(n)O(n). This Area algorithm is divided into three phases: area partition, WCDS construction for each area and adjustment along the area borders. We confirm the effectiveness of our algorithm through analysis and comprehensive simulation study. The number of nodes in the WCDS constructed by this Area algorithm is up to around 50% less than that constructed by the previous well-known algorithm.  相似文献   

19.
It is a challenge to make the routes quickly adapt to the changed network topology when nodes fail in a wireless ad hoc network. In this paper, we propose an adaptive routing protocol, which groups the network nodes into virtual nodes according to their data transfer capabilities and creates virtual-node-based routes. The protocol can accommodate the routes to node failures by adaptively pdating the virtual nodes and just-in-time using available nodes during data transmission. The simulations indicate that the proposed protocol can keep the routes failed-node-freewhen the available virtual node members cover the failed nodes scattering area.  相似文献   

20.
Dandan  Xiaohua  Ivan   《Computer Communications》2007,30(18):3627-3643
Location service provides position of mobile destination to source node to enable geo-routing. In existing quorum-based location service protocols, destination node registers its location along a ‘column’ while source node makes a query along a ‘row’. Grid and quorum-based location service is based on division of network into square grids, and selecting ‘leader’ location server node in each grid. Location updates, leader reelection and information transfer are performed whenever destination and leader nodes are moving to a different grid. We propose here to apply connected dominating sets (DS) as an alternative to grids. We also improved basic quorum, and applied on DS-quorum (DS based quorum) better criterion for triggering local information exchanges and global location updates, by meeting two criteria: certain distance movement and certain number of observed link changes with (DS) nodes. Backbones created by DS nodes (using 1-hop neighborhood information) are small size, do not have a parameter like grid size, and preserve network connectivity without the help of other nodes. Location updates and destination searches are restricted to backbone nodes. Both methods use ‘hello’ messages to learn neighbors. While this suffices to construct DS, grid leader (re)election requires additional messages. Simulation results show that using DS as backbone for quorum construction is superior to using grid as backbone or no backbone at all. The proposed DS-quorum location service can achieve higher (or similar) success rate with much less communication overhead than grid-based approaches.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号