214 research outputs found

    Performance improvement of ad hoc networks using directional antennas and power control

    Get PDF
    Au cours de la derniĂšre dĂ©cennie, un intĂ©rĂȘt remarquable a Ă©tĂ© Ă©prouvĂ© en matiĂšre des rĂ©seaux ad hoc sans fil capables de s'organiser sans soutien des infrastructures. L'utilisation potentielle d'un tel rĂ©seau existe dans de nombreux scĂ©narios, qui vont du gĂ©nie civil et secours en cas de catastrophes aux rĂ©seaux de capteurs et applications militaires. La Fonction de coordination distribuĂ©e (DCF) du standard IEEE 802.11 est le protocole dominant des rĂ©seaux ad hoc sans fil. Cependant, la mĂ©thode DCF n'aide pas Ă  profiter efficacement du canal partagĂ© et Ă©prouve de divers problĂšmes tels que le problĂšme de terminal exposĂ© et de terminal cachĂ©. Par consĂ©quent, au cours des derniĂšres annĂ©es, de diffĂ©rentes mĂ©thodes ont Ă©tĂ© dĂ©veloppĂ©es en vue de rĂ©gler ces problĂšmes, ce qui a entraĂźnĂ© la croissance de dĂ©bits d'ensemble des rĂ©seaux. Ces mĂ©thodes englobent essentiellement la mise au point de seuil de dĂ©tecteur de porteuse, le remplacement des antennes omnidirectionnelles par des antennes directionnelles et le contrĂŽle de puissance pour Ă©mettre des paquets adĂ©quatement. ComparĂ©es avec les antennes omnidirectionnelles, les antennes directionnelles ont de nombreux avantages et peuvent amĂ©liorer la performance des rĂ©seaux ad hoc. Ces antennes ne fixent leurs Ă©nergies qu'envers la direction cible et ont une portĂ©e d'Ă©mission et de rĂ©ception plus large avec la mĂȘme somme de puissance. Cette particularitĂ© peut ĂȘtre exploitĂ©e pour ajuster la puissance d'un transmetteur en cas d'utilisation d'une antenne directionnelle. Certains protocoles de contrĂŽle de puissance directionnel MAC ont Ă©tĂ© proposĂ©s dans les documentations. La majoritĂ© de ces suggestions prennent seulement la transmission directionnelle en considĂ©ration et, dans leurs rĂ©sultats de simulation, ces Ă©tudes ont l'habitude de supposer que la portĂ©e de transmission des antennes omnidirectionnelles et directionnelles est la mĂȘme. Apparemment, cette supposition n'est pas toujours vraie dans les situations rĂ©elles. De surcroĂźt, les recherches prenant l'hĂ©tĂ©rogĂ©nĂ©itĂ© en compte dans les rĂ©seaux ad hoc ne sont pas suffisantes. Le prĂ©sent mĂ©moire est dĂ©diĂ© Ă  proposer un protocole de contrĂŽle de puissance MAC pour les rĂ©seaux ad hoc avec des antennes directionnelles en prenant tous ces problĂšmes en considĂ©ration. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : RĂ©seaux ad hoc, Antennes directives, ContrĂŽle de puissance

    Wireless Multi Hop Access Networks and Protocols

    Get PDF
    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points to the Internet are available, and the mobile node roams to a new access point, the node has to make a decision when and how to change its point of attachment. The thesis describes how to consider the rapid fluctuations of the wireless medium, how to handle the fact that other nodes on the path to the access point are also mobile which results in frequent link and route breaks, and the impact the change of attachment has on already existing connections. Medium access and routing protocols have been developed that consider both the long term and the short term variations of a mobile wireless network. The long term variations consider the fact that as nodes are mobile, links will frequently break and new links appear and thus the network topology map is constantly redrawn. The short term variations consider the rapid fluctuations of the wireless channel caused by mobility and multi path propagation deviations. In order to achieve diversity forwarding, protocols are presented which consider the network topology and the state of the wireless channel when decisions about forwarding need to be made. The medium access protocols are able to perform multi dimensional fast link adaptation on a per packet level with forwarding considerations. This i ncludes power, rate, code and channel adaptation. This will enable the type of performance improvements that are of significant importance for the success of multi hop wireless networks

    Supporting Internet Access and Quality of Service in Distributed Wireless Ad Hoc Networks

    Get PDF
    In this era of wireless hysteria, with continuous technological advances in wireless communication and new wireless technologies becoming standardized at a fast rate, we can expect an increased interest for wireless networks, such as ad hoc and mesh networks. These networks operate in a distributed manner, independent of any centralized device. In order to realize the practical benefits of ad hoc networks, two challenges (among others) need to be considered: distributed QoS guarantees and multi-hop Internet access. In this thesis we present conceivable solutions to both of these problems. An autonomous, stand-alone ad hoc network is useful in many cases, such as search and rescue operations and meetings where participants wish to quickly share information. However, an ad hoc network connected to the Internet is even more desirable. This is because Internet plays an important role in the daily life of many people by offering a broad range of services. In this thesis we present AODV+, which is our solution to achieve this network interconnection between a wireless ad hoc network and the wired Internet. Providing QoS in distributed wireless networks is another challenging, but yet important, task mainly because there is no central device controlling the medium access. In this thesis we propose EDCA with Resource Reservation (EDCA/RR), which is a fully distributed MAC scheme that provides QoS guarantees by allowing applications with strict QoS requirements to reserve transmission time for contention-free medium access. Our scheme is compatible with existing standards and provides both parameterized and prioritized QoS. In addition, we present the Distributed Deterministic Channel Access (DDCA) scheme, which is a multi-hop extension of EDCA/RR and can be used in wireless mesh networks. Finally, we have complemented our simulation studies with real-world ad hoc and mesh network experiments. With the experience from these experiments, we obtained a clear insight into the limitations of wireless channels. We could conclude that a wise design of the network architecture that limits the number of consecutive wireless hops may result in a wireless mesh network that is able to satisfy users’ needs. Moreover, by using QoS mechanisms like EDCA/RR or DDCA we are able to provide different priorities to traffic flows and reserve resources for the most time-critical applications

    Achieving Soft Real-time Guarantees for Interactive Applications in Wireless Mesh Networks

    Get PDF
    The use of 802.11-based multi-hop wireless mesh networks for Internet access is extensive and growing. The primary advantages of this approach are ease of deployment and lower cost. However, these networks are designed for web and e-mail applications. Highly interactive applications, such as multiplayer online games and VoIP, with their requirements for low delay, present significant challenges to these networks. In particular, the interaction between real-time traffic and TCP traffic tends to result in either a failure of the real-time traffic getting its needed QoS or the TCP traffic unnecessarily experiencing very poor throughput. To solve this problem we place real-time and TCP traffic into separate queues. We then rate-limit TCP traffic based on the average queue size of the local or remote real-time queues. Thus, TCP traffic is permitted to use excess bandwidth as long as it does not interfere with real-time traffic guarantees. We therefore call our scheme Real-time Queue-based Rate and Admission Control, RtQ-RAC. Extensive simulations using the network simulator, ns-2, demonstrate that our approach is effective in providing soft real-time support, while allowing efficient use of the remaining bandwidth for TCP traffic

    A Cross-Layer Modification to the DSR Routing Protocol in Wireless Mesh Networks

    Get PDF
    A cross-layer modification to the DSR routing protocol that finds high throughput paths in WMNs has been introduced in this work. The Access Efficiency Factor (AEF) has been introduced in this modification as a local congestion avoidance metric for the DSR routing mechanism as an alternative to the hop count (Hc) metric. In this modification, the selected path is identified by finding a path with the highest minimum AEF (max_min_AEF) value. The basis of this study is to compare the performance of the Hc and max_min_AEF as routing metrics for the DSR protocol in WMNs using the OPNET modeler. Performance comparisons between max_min_AEF, Metric Path (MP), and the well known ETT metrics are also carried out in this work. The results of this modification suggest that employing the max_min_AEF as a routing metric outperforms the Hc, ETT, and MP within the DSR protocol in WMNs in terms of throughput. This is because the max_min_AEF is based upon avoiding directing traffic through congested nodes where significant packet loss is likely to occur. This throughput improvement is associated with an increment in the delay time due to the long paths taken to avoid congested regions. To overcome this drawback, a further modification to the routing discovery mechanism has been made by imposing a hop count limit (HCL) on the discovered paths. Tuning the HCL allows the network manager to tradeoff throughput against delay. The choice of congestion avoidance metric exhibits another shortcoming owing to its dependency on the packet size. It penalises the smaller packets over large ones in terms of path lengths. This has been corrected for by introducing a ModAEF metric that explicitly considers the size of the packet. The ModAEF metric includes a tuning factor that allows the operator determine the level of the weighting that should be applied to the packet size to correct for this dependence

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future

    Experimenting with commodity 802.11 hardware: overview and future directions

    Get PDF
    The huge adoption of 802.11 technologies has triggered a vast amount of experimentally-driven research works. These works range from performance analysis to protocol enhancements, including the proposal of novel applications and services. Due to the affordability of the technology, this experimental research is typically based on commercial off-the-shelf (COTS) devices, and, given the rate at which 802.11 releases new standards (which are adopted into new, affordable devices), the field is likely to continue to produce results. In this paper, we review and categorise the most prevalent works carried out with 802.11 COTS devices over the past 15 years, to present a timely snapshot of the areas that have attracted the most attention so far, through a taxonomy that distinguishes between performance studies, enhancements, services, and methodology. In this way, we provide a quick overview of the results achieved by the research community that enables prospective authors to identify potential areas of new research, some of which are discussed after the presentation of the survey.This work has been partly supported by the European Community through the CROWD project (FP7-ICT-318115) and by the Madrid Regional Government through the TIGRE5-CM program (S2013/ICE-2919).Publicad
    • 

    corecore