83 research outputs found
Throughput capacity of two-hop relay MANETs under finite buffers
Since the seminal work of Grossglauser and Tse [1], the two-hop relay
algorithm and its variants have been attractive for mobile ad hoc networks
(MANETs) due to their simplicity and efficiency. However, most literature
assumed an infinite buffer size for each node, which is obviously not
applicable to a realistic MANET. In this paper, we focus on the exact
throughput capacity study of two-hop relay MANETs under the practical finite
relay buffer scenario. The arrival process and departure process of the relay
queue are fully characterized, and an ergodic Markov chain-based framework is
also provided. With this framework, we obtain the limiting distribution of the
relay queue and derive the throughput capacity under any relay buffer size.
Extensive simulation results are provided to validate our theoretical framework
and explore the relationship among the throughput capacity, the relay buffer
size and the number of nodes
Efficient Routing Mechanisms in MANET for Secure Data Transmission
In the past decades, mobile traffic generated by devices such as smart phones, phones, laptops and mobile gateways has been growing rapidly. While traditional direct connection techniques evolve to provide better access to the Internet, a new type of wireless network, mobile ad hoc network (MANET), has emerged. A MANET differs from a direct connection network in the way that it is multi-hopping and self-organizing and thus able to operate without the help of prefixed infrastructures. However, challenges such dynamic topology, unreliable wireless links and resource constraints impede the wide applications of MANETs. In this paper routing mechanisms is discovered which provides high security for data transmission in manets
Research on Wireless Multi-hop Networks: Current State and Challenges
Wireless multi-hop networks, in various forms and under various names, are
being increasingly used in military and civilian applications. Studying
connectivity and capacity of these networks is an important problem. The
scaling behavior of connectivity and capacity when the network becomes
sufficiently large is of particular interest. In this position paper, we
briefly overview recent development and discuss research challenges and
opportunities in the area, with a focus on the network connectivity.Comment: invited position paper to International Conference on Computing,
Networking and Communications, Hawaii, USA, 201
Energy Efficient and Guaranteed Packet Delivery in Mobile Ad Hoc Networks
For Ad-hoc network routing protocols, high delivery ratio with low energy consumption is one of design challenges. This paper identifies the limitations of ad hoc routing scheme, in terms of guaranteed delivery with low energy consumption. Accordingly, this paper describe a scheme, in which data is forwarded along a pre-established lone path to save energy, and a high delivery ratio is completed by path repair whenever a break is detected. This paper propose a humble, quick, local path repairing method, whereby a malicious node can be tracked by low energy. This paper implement encoding and compression technique scheme and compare its performance with those of pure lone path without repair and multi-path routing schemes
Source Delay in Mobile Ad Hoc Networks
Source delay, the time a packet experiences in its source node, serves as a
fundamental quantity for delay performance analysis in networks. However, the
source delay performance in highly dynamic mobile ad hoc networks (MANETs) is
still largely unknown by now. This paper studies the source delay in MANETs
based on a general packet dispatching scheme with dispatch limit (PD-
for short), where a same packet will be dispatched out up to times by its
source node such that packet dispatching process can be flexibly controlled
through a proper setting of . We first apply the Quasi-Birth-and-Death (QBD)
theory to develop a theoretical framework to capture the complex packet
dispatching process in PD- MANETs. With the help of the theoretical
framework, we then derive the cumulative distribution function as well as mean
and variance of the source delay in such networks. Finally, extensive
simulation and theoretical results are provided to validate our source delay
analysis and illustrate how source delay in MANETs are related to network
parameters.Comment: 11page
Throughput-Delay Trade-off for Hierarchical Cooperation in Ad Hoc Wireless Networks
Hierarchical cooperation has recently been shown to achieve better throughput
scaling than classical multihop schemes under certain assumptions on the
channel model in static wireless networks. However, the end-to-end delay of
this scheme turns out to be significantly larger than those of multihop
schemes. A modification of the scheme is proposed here that achieves a
throughput-delay trade-off for T(n) between
and , where D(n) and T(n) are
respectively the average delay per bit and the aggregate throughput in a
network of n nodes. This trade-off complements the previous results of El Gamal
et al., which show that the throughput-delay trade-off for multihop schemes is
given by D(n)=T(n) where T(n) lies between and .
Meanwhile, the present paper considers the network multiple-access problem,
which may be of interest in its own right.Comment: 9 pages, 6 figures, to appear in IEEE Transactions on Information
Theory, submitted Dec 200
On file-based content distribution over wireless networks via multiple paths: Coding and delay trade-off
With the emergence of the adaptive bit rate (ABR) streaming technology, the video/content streaming technology is shifting toward a file-based content distribution. That is, video content is encoded into a set of smaller media files containing video of 2-10 seconds before transmission. This file-based content distribution, coupled with increasingly rapid adoption of smartphones, requires an efficient file-based distribution algorithm to satisfy the QoS demand in wireless networks. In this paper, we study the transmission of a finite-sized file over wireless networks using multipath routing, with the objective to minimize file transmission delay instead of average packet delay. The file transmission delay is defined as the time interval from the instant that a file is first transmitted to the time at which the file can be reconstructed in the destination node. We observe that file transmission delay depends not only on the mean of the packet delay but also on its distribution, especially the tail. This observation leads to a better understanding of the file transfer delay in wireless networks and a minimum delay file transmission strategy. In a wireless multipath communication scenario, we propose to use packet level erasure code (e.g., digital fountain code) to transmit data file with redundancy. Given that a file with k packets is encoded into n packets for transmission, the use of digital fountain code allows the file to be received when only k out of n packets are received. By adding redundant packets, the destination node does not have to wait for the packet to arrive late, hence reducing the delay of the file transmission. We characterize the tradeoff between the code rate (i.e., the ratio of the number of transmitted packets to the number of the original packets) and the file delay reduction. As a rule of thumb, we provide practical guidelines in determining an appropriate code rate for a fixed file to achieve a reasonable transmission delay. We show that only- - a few redundant packets are needed to achieve a significant reduction in file transmission delay
- …