4,502 research outputs found
A cross layer multi hop network architecture for wireless Ad Hoc networks
In this paper, a novel decentralized cross-layer multi-hop cooperative network architecture is presented. Our architecture involves the design of a simple yet efficient cooperative flooding scheme,two decentralized opportunistic cooperative forwarding mechanisms as well as the design of Routing
Enabled Cooperative Medium Access Control (RECOMAC) protocol that spans and incorporates the physical, medium access control (MAC) and routing layers for improving the performance of multihop communication. The proposed architecture exploits randomized coding at the physical layer to realize cooperative diversity. Randomized coding alleviates relay selection and actuation mechanisms,and therefore reduces the coordination among the relays. The coded packets are forwarded via opportunistically formed cooperative sets within a region, without communication among the relays and without establishing a prior route. In our architecture, routing layer functionality is submerged into the
MAC layer to provide seamless cooperative communication while the messaging overhead to set up routes, select and actuate relays is minimized. RECOMAC is shown to provide dramatic performance improvements, such as eight times higher throughput and ten times lower end-to-end delay as well as reduced overhead, as compared to networks based on well-known IEEE 802.11 and Ad hoc On Demand
Distance Vector (AODV) protocols
Cooperative Medium Access Mechanisms and Service-oriented Routing in Multi-hop Wireless Networks
Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, Grimstad, 2011Multi-hop wireless networks have been regarded as a promising path towards future
wireless communication landscape. In the past decade, most related work has been
performed in the context of mobile ad hoc networks. In very recent years, however,
much effort has been shifted to more static networks such as wireless mesh networks
and wireless sensor networks. While significant progress has been achieved through
these years, both theoretically and experimentally, challenges still exist in various
aspects of these networks. For instance, how to use multi-hop networks as a means
for providing broadband Internet services with reliability and balanced load remains
as a challenging task. As the number of end-users is increasing rapidly and more
and more users are enjoying multimedia services, how to provide Quality of Service
(QoS) with user satisfaction in such networks remains also as a hot topic.
Meanwhile, another direction which has recently attracted lots of efforts in the
international research community is the introduction of cooperative communications.
Cooperative communications based on relaying nodes are capable of improving
network performance in terms of increased spectral and power efficiency, extended
network coverage, balanced QoS, infrastructure-less deployment, etc. Cooperation
may happen at different communication layers, at the physical layer where
the received signal is retransmitted and at the MAC and routing layers where a
packet is forwarded to the next hop in a coordinated manner towards the destination,
respectively. However, without joint consideration and design of physical
layer, MAC layer and network layer, the benefit of cooperative communication cannot
be exploited to the maximum extent. In addition, how to extend one-hop cooperative
communication into multi-hop wireless network scenarios remains as an
almost un-chartered research frontier.
In this dissertation, we enhance the state of the art technologies in the field of
multi-hop wireless networks from a layered perspective. While efficient scheduling
mechanisms are proposed at the MAC layer, elaborate routing protocols are devised
at the network layer. More specifically, by taking into account of cross layer design
we cope with network congestion problems in wireless mesh networks mainly at the
network layer. In order to further improve the performance of cooperative wireless
networks, we propose a contention-based cooperative MAC protocol in the presence
of multiple relay nodes. Since a large majority of existing cooperative MAC
protocols are designed based on widely-used IEEE 802.11 MAC protocol which
exhibits inherent design constraint when applied in multi-hop wireless networks, it
is imperative to develop a novel cooperative MAC protocol which is appropriate
for multi-hop network scenarios. Next, we propose a TDMA-based MAC protocol supporting cooperative communications in static multi-hop wireless networks. Furthermore,
a cooperative lifetime maximization MAC protocol is proposed to cope
with the energy hole problem in wireless sensor networks
RECOMAC: a cross-layer cooperative network protocol for wireless ad hoc networks
A novel decentralized cross-layer multi-hop cooperative protocol, namely, Routing Enabled Cooperative Medium Access Control (RECOMAC) is proposed for wireless ad hoc networks. The protocol architecture makes use of cooperative
forwarding methods, in which coded packets are forwarded via opportunistically formed cooperative sets within a region, as RECOMAC spans the physical, medium access control (MAC) and routing layers. Randomized coding is exploited at the physical layer to realize cooperative transmissions, and cooperative forwarding is implemented for routing functionality, which is submerged into the MAC layer, while the overhead for MAC and route set up is minimized. RECOMAC is shown to provide dramatic performance improvements of eight times higher throughput and one tenth of end-to-end delay than that of the conventional architecture in practical wireless mesh networks
Wireless model-based predictive networked control system over cooperative wireless network
Owing to their distributed architecture, networked control systems (NCSs) are proven to be feasible in scenarios where a spatially distributed feedback control system is required. Traditionally, such NCSs operate over real-time wired networks. Recently, in order to achieve the utmost flexibility, scalability, ease of deployment, and maintainability, wireless networks such as IEEE 802.11 wireless local area networks (LANs) are being preferred over dedicated wired networks. However, conventional NCSs with event-triggered controllers and actuators cannot operate over such general purpose wireless networks since the stability of the system is compromised due to unbounded delays and unpredictable packet losses that are typical in the wireless medium. Approaching the wireless networked control problem from two perspectives, this work introduces a practical wireless NCS and an implementation of a cooperative medium access control protocol that work jointly to achieve decent control under severe impairments, such as unbounded delay, bursts of packet loss and ambient wireless traffic. The proposed system is evaluated on a dedicated test platform under numerous scenarios and significant performance gains are observed, making cooperative communications a strong candidate for improving the reliability of industrial wireless networks
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have
significant performance gains over the legacy direct transmission scheme.
Compared with single relay based cooperation schemes, utilizing multiple relays
further improves the reliability and rate of transmissions. Distributed
space-time coding (DSTC), as one of the schemes to utilize multiple relays,
requires tight coordination between relays and does not perform well in a
distributed environment with mobility. In this paper, a cooperative medium
access control (MAC) layer protocol, called \emph{STiCMAC}, is designed to
allow multiple relays to transmit at the same time in an IEEE 802.11 network.
The transmission is based on a novel DSTC scheme called \emph{randomized
distributed space-time coding} (\emph{R-DSTC}), which requires minimum
coordination. Unlike conventional cooperation schemes that pick nodes with good
links, \emph{STiCMAC} picks a \emph{transmission mode} that could most improve
the end-to-end data rate. Any station that correctly receives from the source
can act as a relay and participate in forwarding. The MAC protocol is
implemented in a fully decentralized manner and is able to opportunistically
recruit relays on the fly, thus making it \emph{robust} to channel variations
and user mobility. Simulation results show that the network capacity and delay
performance are greatly improved, especially in a mobile environment.Comment: This paper is a revised version of a paper with the same name
submitted to IEEE Transaction on Wireless Communications. STiCMAC protocol
with RTS/CTS turned off is presented in the appendix of this draf
Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks
—Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes all the nodes in the network are cooperative. However, nodes may purposefully misbehave in order to disrupt network performance, obtain extra bandwidth and conserve resources. These MAC layer misbehaviours can lead to Denial of Service (DoS) attacks which can disrupt the network operation. There is a lack of comprehensive analysis of MAC layer misbehaviour driven DoS attacks for the IEEE 802.11 protocol. This research studied possible MAC layer DoS attack strategies that are driven by the MAC layer malicious/selfish nodes and investigates the performance of the IEEE 802.11 protocol. Such DoS attacks caused by malicious and selfish nodes violating backoff timers associated with the protocol. The experimental and analytical approach evaluates several practical MAC layer backoff value manipulation and the impact of such attacks on the network performance and stability in MANETs. The simulation results show that introducing DoS attacks at MAC layer could significantly affect the network throughput and data packet collision rate. This paper concludes that DoS attacks with selfish/malicious intend can obtain a larger throughput by denying well-behaved nodes to obtain deserved throughput, also DoS attacks with the intend of complete destruction of the network can succee
- …