157 research outputs found
A Multi-layer Routing Protocol for Mobility Management in Wireless Mesh Networks
AbstractIn the recent trends, Wireless Mesh networks are proven to be one of the emerging fields in the wireless networks. WMNs comprises of Gateways (GWs), Mesh Clients (MCs) and Mesh Routers (MRs). However, it is challenging job to provide seamless connectivity when MC moves around the network. The recent advances in the field of wireless technology created a chance to overwhelmed the disadvantages of wired and wireless networks. The mobility management in the WMNs motivated the researchers to concentrate. In this paper, we are proposing a model called as multi-layer routing protocol for WMNs. This protocol works with the data link layer and network layer for data frame transmission. The proposed algorithm is implemented with intra domain for experimental evaluation. The experimental results show the effectiveness of the routing protocol
CR-MAC: A multichannel MAC protocol for cognitive radio ad hoc networks
This paper proposes a cross-layer based cognitive radio multichannel medium
access control (MAC) protocol with TDMA, which integrate the spectrum sensing
at physical (PHY) layer and the packet scheduling at MAC layer, for the ad hoc
wireless networks. The IEEE 802.11 standard allows for the use of multiple
channels available at the PHY layer, but its MAC protocol is designed only for
a single channel. A single channel MAC protocol does not work well in a
multichannel environment, because of the multichannel hidden terminal problem.
Our proposed protocol enables secondary users (SUs) to utilize multiple
channels by switching channels dynamically, thus increasing network throughput.
In our proposed protocol, each SU is equipped with only one spectrum agile
transceiver, but solves the multichannel hidden terminal problem using temporal
synchronization. The proposed cognitive radio MAC (CR-MAC) protocol allows SUs
to identify and use the unused frequency spectrum in a way that constrains the
level of interference to the primary users (PUs). Our scheme improves network
throughput significantly, especially when the network is highly congested. The
simulation results show that our proposed CR-MAC protocol successfully exploits
multiple channels and significantly improves network performance by using the
licensed spectrum band opportunistically and protects PUs from interference,
even in hidden terminal situations.Comment: 14 Pages, International Journa
An Energy Efficient Multichannel MAC Protocol for Cognitive Radio Ad Hoc Networks
This paper presents a TDMA based energy efficient cognitive radio
multichannel medium access control (MAC) protocol called ECR-MAC for wireless
Ad Hoc Networks. ECR-MAC requires only a single half-duplex radio transceiver
on each node that integrates the spectrum sensing at physical (PHY) layer and
the packet scheduling at MAC layer. In addition to explicit frequency
negotiation which is adopted by conventional multichannel MAC protocols,
ECR-MAC introduces lightweight explicit time negotiation. This two-dimensional
negotiation enables ECR-MAC to exploit the advantage of both multiple channels
and TDMA, and achieve aggressive power savings by allowing nodes that are not
involved in communication to go into doze mode. The IEEE 802.11 standard allows
for the use of multiple channels available at the PHY layer, but its MAC
protocol is designed only for a single channel. A single channel MAC protocol
does not work well in a multichannel environment, because of the multichannel
hidden terminal problem. The proposed energy efficient ECR-MAC protocol allows
SUs to identify and use the unused frequency spectrum in a way that constrains
the level of interference to the primary users (PUs). Extensive simulation
results show that our proposed ECR-MAC protocol successfully exploits multiple
channels and significantly improves network performance by using the licensed
spectrum band opportunistically and protects QoS provisioning over cognitive
radio ad hoc networks.Comment: 8 Pages, International Journa
An Energy Efficient MAC Protocol for QoS Provisioning in Cognitive Radio Ad Hoc Networks
The explosive growth in the use of real-time applications on mobile devices has resulted in new challenges to the design of medium access control (MAC) protocols for ad hoc networks. In this paper, we propose an energy efficient cognitive radio (CR) MAC protocol for QoS provisioning called ECRQ-MAC, which integrate the spectrum sensing at physical (PHY) layer and the channel-timeslots allocation at MAC layer. We consider the problem of providing QoS guarantee to CR users as well as to maintain the most efficient use of scarce bandwidth resources. The ECRQ-MAC protocol exploits the advantage of both multiple channels and TDMA, and achieves aggressive power savings by allowing CR users that are not involved in communication to go into sleep mode. The proposed ECRQ-MAC protocol allows CR users to identify and use the unused frequency spectrum of licensed band in a way that constrains the level of interference to the primary users (PUs). Our scheme improves network throughput significantly, especially when the network is highly congested. The simulation results show that our proposed protocol successfully exploits multiple channels and significantly improves network performance by using the licensed spectrum opportunistically and protects QoS provisioning over cognitive radio ad hoc networks
Approximation bounds on maximum edge 2-coloring of dense graphs
For a graph and integer , an edge -coloring of is an
assignment of colors to edges of , such that edges incident on a vertex span
at most distinct colors. The maximum edge -coloring problem seeks to
maximize the number of colors in an edge -coloring of a graph . The
problem has been studied in combinatorics in the context of {\em anti-Ramsey}
numbers. Algorithmically, the problem is NP-Hard for and assuming the
unique games conjecture, it cannot be approximated in polynomial time to a
factor less than . The case , is particularly relevant in practice,
and has been well studied from the view point of approximation algorithms. A
-factor algorithm is known for general graphs, and recently a -factor
approximation bound was shown for graphs with perfect matching. The algorithm
(which we refer to as the matching based algorithm) is as follows: "Find a
maximum matching of . Give distinct colors to the edges of . Let
be the connected components that results when M is
removed from G. To all edges of give the th color."
In this paper, we first show that the approximation guarantee of the matching
based algorithm is for graphs with perfect matching
and minimum degree . For , this is better than the approximation guarantee proved in {AAAP}. For triangle free graphs
with perfect matching, we prove that the approximation factor is , which is better than for .Comment: 11pages, 3 figure
Characterization of multi-channel interference
Multi-channel communication protocols in wireless networks usually assume perfect orthogonality between wireless channels or consider only the use of interference-free channels. The first approach may overestimate the performance whereas the second approach may fail to utilize the spectrum efficiently. Therefore, a more realistic approach would be the careful use of interfering channels by controlling the interference at an acceptable level. We present a methodology to estimate the packet error rate (PER) due to inter-channel interference in a wireless network. The methodology experimentally characterizes the multi-channel interference and analytically estimates it based on the observations from the experiments. Furthermore, the analytical estimation is used in simulations to derive estimates of the capacity in larger networks. Simulation results show that the achievable network capacity, which is defined as the number of simultaneous transmissions, significantly increases with realistic interfering channels compared with the use of only orthogonal channels. When we consider the same number of channels, the achievable capacity with realistic interfering channels can be close to the capacity of idealistic orthogonal channels. This shows that overlapping channels which constitute a much smaller band, provides more efficient use of the spectrum. Finally, we explore the correctness of channel orthogonality and show why this assumption may fail in a practical setting
Heuristic algorithms for the min-max edge 2-coloring problem
In multi-channel Wireless Mesh Networks (WMN), each node is able to use
multiple non-overlapping frequency channels. Raniwala et al. (MC2R 2004,
INFOCOM 2005) propose and study several such architectures in which a computer
can have multiple network interface cards. These architectures are modeled as a
graph problem named \emph{maximum edge -coloring} and studied in several
papers by Feng et. al (TAMC 2007), Adamaszek and Popa (ISAAC 2010, JDA 2016).
Later on Larjomaa and Popa (IWOCA 2014, JGAA 2015) define and study an
alternative variant, named the \emph{min-max edge -coloring}.
The above mentioned graph problems, namely the maximum edge -coloring and
the min-max edge -coloring are studied mainly from the theoretical
perspective. In this paper, we study the min-max edge 2-coloring problem from a
practical perspective. More precisely, we introduce, implement and test four
heuristic approximation algorithms for the min-max edge -coloring problem.
These algorithms are based on a \emph{Breadth First Search} (BFS)-based
heuristic and on \emph{local search} methods like basic \emph{hill climbing},
\emph{simulated annealing} and \emph{tabu search} techniques, respectively.
Although several algorithms for particular graph classes were proposed by
Larjomaa and Popa (e.g., trees, planar graphs, cliques, bi-cliques,
hypergraphs), we design the first algorithms for general graphs.
We study and compare the running data for all algorithms on Unit Disk Graphs,
as well as some graphs from the DIMACS vertex coloring benchmark dataset.Comment: This is a post-peer-review, pre-copyedit version of an article
published in International Computing and Combinatorics Conference
(COCOON'18). The final authenticated version is available online at:
http://www.doi.org/10.1007/978-3-319-94776-1_5
- …