共查询到20条相似文献,搜索用时 15 毫秒
1.
Distributed quality-of-service routing in ad hoc networks 总被引:10,自引:0,他引:10
In an ad hoc network, all communication is done over wireless media, typically by radio through the air, without the help of wired base stations. Since direct communication is allowed only between adjacent nodes, distant nodes communicate over multiple hops. The quality-of-service (QoS) routing in an ad hoc network is difficult because the network topology may change constantly, and the available state information for routing is inherently imprecise. In this paper, we propose a distributed QoS routing scheme that selects a network path with sufficient resources to satisfy a certain delay (or bandwidth) requirement in a dynamic multihop mobile environment. The proposed algorithms work with imprecise state information. Multiple paths are searched in parallel to find the most qualified one. Fault-tolerance techniques are brought in for the maintenance of the routing paths when the nodes move, join, or leave the network. Our algorithms consider not only the QoS requirement, but also the cost optimality of the routing path to improve the overall network performance. Extensive simulations show that high call admission ratio and low-cost paths are achieved with modest routing overhead. The algorithms can tolerate a high degree of information imprecision 相似文献
2.
This paper presents several distributed algorithms that cause a token to continually circulate through all the nodes of a mobile ad hoc network. An important application of such algorithms is to ensure total order of message, delivery in a group communication service. Some of the proposed algorithms are aware of, and adapt to changes in the ad hoc network topology. When using a token circulation algorithm, a round is said to complete when every node has been visited at least once. Criteria for comparing the algorithms include the average time, required to complete a round, number of bytes sent per round, and number of nodes visited per round. Comparison between the proposed algorithms is performed using simulation results obtained from a detailed simulation model (with ns-2 simulator). We also give a rigorous worst-case analysis of the proposed LR algorithm, which gives the best overall performance in the simulation. 相似文献
3.
Multipath video transport over ad hoc networks 总被引:3,自引:0,他引:3
Real-time multimedia transport has stringent bandwidth, delay, and loss requirements. It is a great challenge to support such applications in wireless ad hoc networks, which are characterized by frequent link failures and congestion. Using multiple paths in parallel for a real-time multimedia session (called multipath transport) provides a new degree of freedom in designing robust multimedia transport systems. In this article, we describe a framework for multipath video transport over wireless ad hoc networks, and examine its essential components, including multistream video coding, multipath routing, and transport mechanisms. We illustrate by three representative examples how to extend existing video coding schemes in order to fully explore the potential of multipath transport. We also examine important mechanisms in different layers for supporting multipath video transport over ad hoc networks. Our experiments show that multipath transport is a promising technique for efficient video communications over ad hoc networks. 相似文献
4.
A survey of TCP over ad hoc networks 总被引:2,自引:0,他引:2
《Communications Surveys & Tutorials, IEEE》2005,7(3):22-36
5.
Securing ad hoc networks 总被引:22,自引:0,他引:22
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats on ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which terms the core of our security framework 相似文献
6.
J. Alonso-ZárateAuthor Vitae C. CrespoAuthor VitaeCh. SkianisAuthor Vitae L. AlonsoAuthor VitaeCh. VerikoukisAuthor Vitae 《Ad hoc Networks》2012,10(3):536-551
The Distributed Point Coordination Function (DPCF) is presented in this paper as a novel Medium Access Control Protocol (MAC) for wireless ad hoc networks. DPCF extends the operation of the Point Coordination Function (PCF) defined in the IEEE 802.11 Standard to operate over wireless networks without infrastructure. In PCF, a central point coordinator polls the users to get access to the channel and data collisions are completely avoided, thus yielding high performance. In order to extend its high performance to networks without infrastructure, the DPCF is proposed in this paper as a combination of the Distributed Coordination Function (DCF) and the PCF. The general idea is to combine a dynamic, temporary, and spontaneous clustering mechanism based on DCF with the execution of PCF within each cluster. The backwards compatibility of DPCF with legacy 802.11 networks is also assessed in this paper. Comprehensive computer-based simulations demonstrate the high performance of this new protocol in both single-hop and multi-hop networks. 相似文献
7.
Giacomazzi P. Musumeci L. Caizzone G. Verticale G. Liggieri G. Proietti A. Sabatini S. 《IEEE network》2006,20(1):12-20
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networks. To investigate the performance characteristics of this service, we propose a complete system architecture, which includes a MAC protocol, a routing protocol, and the treatment of voice packets. The telephone system is analyzed in the case of point-to-point calls inside the ad hoc network, and the end-to-end performance is assessed in terms of the percentage of blocked and dropped calls, packet loss and packet delay. The analysis takes into account network scalability by investigating how; the size of the multihop ad hoc network impacts the quality of service. Moreover, the synthetic mean opinion score of the telephone service is evaluated according to the ITU-T E-model. 相似文献
8.
The delay-limited throughput of an ad hoc wireless network confined to a finite region is investigated. An approximate expression for the achievable throughput as a function of the maximum allowable delay is obtained. It is found that: 1) for moderate values of the delay d, the throughput that can be achieved by taking advantage of the motion increases as d/sup 2/3/ and 2) for a fixed value of d, the dependence of the achievable throughput on the number of nodes n is n/sup -1/3/. A transmission and relaying strategy ensuring continuous information flow is constructed. It is shown that there exists a critical value of the delay such that: 1) for values of the delay d below the critical delay, the throughput does not benefit appreciably from the motion and 2) the dependence of the critical delay on the number of nodes is a very slowly increasing function (n/sup 1/14/). Finally, asymptotic optimality of the proposed strategy in a certain class is shown. 相似文献
9.
Position-based routing in ad hoc networks 总被引:15,自引:0,他引:15
The availability of small, inexpensive low-power GPS receivers and techniques for finding relative coordinates based on signal strengths, and the need for the design of power-efficient and scalable networks provided justification for applying position-based routing methods in ad hoc networks. A number of such algorithms were developed previously. This tutorial will concentrate on schemes that are loop-free, localized, and follow a single-path strategy, which are desirable characteristics for scalable routing protocols. Routing protocols have two modes: greedy mode (when the forwarding node is able to advance the message toward the destination) and recovery mode (applied until return to greedy mode is possible). We discuss them separately. Methods also differ in metrics used (hop count, power, cost, congestion, etc.), and in past traffic memorization at nodes (memoryless or memorizing past traffic). Salient properties to be emphasized in this review are guaranteed delivery, scalability, and robustness 相似文献
10.
Guest editorial wireless ad hoc networks 总被引:1,自引:0,他引:1
Haas Z.J. Gerla M. Johnson D.B. Perkins C.E. Pursley M.B. Steenstrup M. Toh C.-K. Hayes J.F. 《Selected Areas in Communications, IEEE Journal on》1999,17(8):1329-1332
11.
Marcela Mejia Néstor Peña Jose L. Muñoz Oscar Esparza Marco Alzate 《Ad hoc Networks》2012,10(7):1379-1398
The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward other nodes’ packets). Thus, rational nodes (those nodes willing to cooperate if deemed worthy) must detect and isolate selfish nodes in order to cooperate only among themselves. To achieve this purpose, in this paper we present a new game theoretic trust model called DECADE (Distributed Emergent Cooperation through ADaptive Evolution). The design of DECADE is shown by first, analyzing a simple case of packet forwarding between two nodes, and then the results are extended to bigger networks. In DECADE, each node seeks individually to maximize its chance to deliver successfully their own packets, so that the cooperation among rational nodes and the isolation of selfish nodes appear as an emergent collective behavior. This behavior emerges as long as there is a highly dynamic interaction among nodes. So, for those cases where the mobility alone does not suffice to provide this interaction, DECADE includes a sociability parameter that encourages nodes to interact among them for faster learning and adaptability. Additionally, DECADE introduces very low overhead on computational and communication resources, achieving close to optimal cooperation levels among rational nodes and almost complete isolation of selfish nodes. 相似文献
12.
13.
Mesh networks: commodity multihop ad hoc networks 总被引:31,自引:0,他引:31
In spite of the massive efforts in researching and developing mobile ad hoc networks in the last decade, this type of network has not yet witnessed mass market deployment. The low commercial penetration of products based on ad hoc networking technology could be explained by noting that the ongoing research is mainly focused on implementing military or specialized civilian applications. On the other hand, users are interested in general-purpose applications where high bandwidth and open access to the Internet are consolidated and cheap commodities. To turn mobile ad hoc networks into a commodity, we should move to more pragmatic "opportunistic ad hoc networking" in which multihop ad hoc networks are not isolated self-configured networks, but rather emerge as a flexible and low-cost extension of wired infrastructure networks coexisting with them. Indeed, a new class of networks is emerging from this view: mesh networks. This article provides an overview of mesh networking technology. In particular, starting from commercial case studies we describe the core building blocks and distinct features on which wireless mesh networks should be based. We provide a survey of the current state of the art in off-the-shelf and proprietary solutions to build wireless mesh networks. Finally, we address the challenges of designing a high-performance, scalable, and cost-effective wireless mesh network. 相似文献
14.
Positioning in ad hoc sensor networks 总被引:5,自引:0,他引:5
Position and orientation of individual nodes in ad hoc sensor networks are useful for both service and application implementation. Services that can be enabled by availability of position include routing and querying. At application level, position is required in order to label the reported data in a sensor network, whereas position and orientation enable tracking. Nodes may have local capabilities such as the possibility of measuring ranges to neighbors, angle of arrival, or global capabilities, such as GPS and digital compasses. This article surveys methods used to infer locations in a multihop fashion in networks with or without the mentioned capabilities. 相似文献
15.
Authenticated routing for ad hoc networks 总被引:10,自引:0,他引:10
Sanzgiri K. LaFlamme D. Dahill B. Levine B.N. Shields C. Belding-Royer E.M. 《Selected Areas in Communications, IEEE Journal on》2005,23(3):598-610
Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their effects on ad hoc on-demand distance vector and dynamic source routing. Our protocol, named authenticated routing for ad hoc networks (ARAN), uses public-key cryptographic mechanisms to defeat all identified attacks. We detail how ARAN can secure routing in environments where nodes are authorized to participate but untrusted to cooperate, as well as environments where participants do not need to be authorized to participate. Through both simulation and experimentation with our publicly available implementation, we characterize and evaluate ARAN and show that it is able to effectively and efficiently discover secure routes within an ad hoc network. 相似文献
16.
Active routing for ad hoc networks 总被引:1,自引:0,他引:1
Ad hoc networks are wireless multihop networks whose highly volatile topology makes the design and operation of a standard routing protocol hard. With an active networking approach, one can define and deploy routing logic at runtime in order to adapt to special circumstances and requirements. We have implemented several active ad hoc routing protocols that configure the forwarding behavior of mobile nodes, allowing data packets to be efficiently routed between any two nodes of the wireless network. Isolating a simple forwarding layer in terms of both implementation and performance enables us to stream delay-sensitive audio data over the ad hoc network. In the control plane, active packets permanently monitor the connectivity and setup, and modify the routing state 相似文献
17.
Xiaodong Lin Rongxing Lu Chenxi Zhang Haojin Zhu Pin-Han Ho Xuemin Shen 《Communications Magazine, IEEE》2008,46(4):88-95
Vehicular communication networking is a promising approach to facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this article we first review the current standardization process, which covers the methods of providing security services and preserving driver privacy for wireless access in vehicular environments (WAVE) applications. We then address two fundamental issues, certificate revocation and conditional privacy preservation, for making the standards practical. In addition, a suite of novel security mechanisms are introduced for achieving secure certificate revocation and conditional privacy preservation, which are considered among the most challenging design objectives in vehicular ad hoc networks. 相似文献
18.
19.
20.
We investigate the inherent scalability problem of ad hoc networks originated from the nature of multihop networks. First, the expected packet traffic at the center of a network is analyzed. The result shows that the expected packet traffic at the center of a network is linearly related with the network size, that is, the expected packet traffic at the center of a network is O(k), where k is the radius of a network. From the result, the upper bound of the diameter of a network D=2k, that guarantees the network is scalable, is obtained. The upper bound is given by C/r-1, where C is the channel capacity available to each node and r is the packet arrival rate at each node. 相似文献