168 research outputs found

    ENERGY CONSERVATION FOR WIRELESS AD HOC ROUTING

    Get PDF
    Self-configuring wireless ad hoc networks have attracted considerable attention in the last few years due to their valuable civil and military applications. One aspect of such networks that has been studied insufficiently is the energy efficiency. Energy efficiency is crucial to prolong the network lifetime and thus make the network more survivable.Nodes in wireless ad hoc networks are most likely to be driven by battery and hence operate on an extremely frugal energy budget. Conventional ad hoc routing protocols are focused on handling the mobility instead of energy efficiency. Energy efficient routing strategies proposed in literature either do not take advantage of sleep modes to conserve energy more efficiently, or incur much overhead in terms of control message and computing complexity to schedule sleep modes and thus are not scalable.In this dissertation, a novel strategy is proposed to manage the sleep of the nodes in the network so that energy can be conserved and network connectivity can be kept. The novelty of the strategy is its extreme simplicity. The idea is derived from the results of the percolation theory, typically called gossiping. Gossiping is a convenient and effective approach and has been successfully applied to several areas of the networking. In the proposed work, we will developa sleep management protocol from gossiping for both static and mobile wireless ad hoc networks. Then the protocol will be extended to the asynchronous network, where nodes manage their own states independently. Analysis and simulations will be conducted to show thecorrectness, effectiveness and efficiency of the proposed work. The comparison between analytical and simulation results will justify them for each other. We will investigate the most important performance aspects concerning the proposed strategy, including the effect ofparameter tuning and the impacts of routing protocols. Furthermore, multiple extensions will be developed to improve the performance and make the proposed strategy apply to different network scenarios

    Epidemic-Style Information Dissemination in Large-Scale Wireless Networks

    Get PDF
    Steen, M.R. van [Promotor

    On the Impact of Geometry on Ad Hoc Communication in Wireless Networks

    Full text link
    In this work we address the question how important is the knowledge of geometric location and network density to the efficiency of (distributed) wireless communication in ad hoc networks. We study fundamental communication task of broadcast and develop well-scalable, randomized algorithms that do not rely on GPS information, and which efficiency formulas do not depend on how dense the geometric network is. We consider two settings: with and without spontaneous wake-up of nodes. In the former setting, in which all nodes start the protocol at the same time, our algorithm accomplishes broadcast in O(Dlogn+log2n)O(D\log n + \log^2 n) rounds under the SINR model, with high probability (whp), where DD is the diameter of the communication graph and nn is the number of stations. In the latter setting, in which only the source node containing the original message is active in the beginning, we develop a slightly slower algorithm working in O(Dlog2n)O(D\log^2 n) rounds whp. Both algorithms are based on a novel distributed coloring method, which is of independent interest and potential applicability to other communication tasks under the SINR wireless model

    Some combinational optimization problems on radio network communication and machine scheduling

    Get PDF
    The combinatorial optimization problems coming from two areas are studied in this dissertation: network communication and machine scheduling. In the network communication area, the complexity of distributed broadcasting and distributed gossiping is studied in the setting of random networks. Two different models are considered: one is random geometric networks, the main model used to study properties of sensor and ad-hoc networks, where ri points are randomly placed in a unit square and two points are connected by an edge if they are at most a certain fixed distance r from each other. The other model is the so-called line-of-sight networks, a new network model introduced recently by Frieze et al. (SODA\u2707). The nodes in this model are randomly placed (with probability p) on an n x n grid and a node can communicate with all the nodes that are in at most a certain fixed distance r and which are in the same row or column. It can be shown that in many scenarios of both models, the random structure of these networks makes it possible to perform distributed gossiping in asymptotically optimal time 0(D), where D is the diameter of the network. The simulation results show that most algorithms especially the randomized algorithm works very fast in practice. In the scheduling area, the first problem is online scheduling a set of equal processing time tasks with precedence constraints so as to minimize the makespan. It can be shown that Hu \u27s algorithm yields an asymptotic competitive ratio of 3/2 for intree precedence constraints and an asymptotic competitive ratio of 1 for outtree precedences, and Coffinan-Graham algorithm yields an asymptotic competitive ratio of 1 for arbitrary precedence constraints and two machines.The second scheduling problem is the integrated production and delivery scheduling with disjoint windows. In this problem, each job is associated with a time window, and a profit. A job must be finished within its time window to get the profit. The objective is to pick a set ofjobs and schedule them to get the maximum total profit. For a single machine and unit profit, an optimal algorithm is proposed. For a single machine and arbitrary profit, a fully polynomial time approximation scheme(FPTAS) is proposed. These algorithms can be extended to multiple machines with approximation ratio less than e/(e - 1). The third scheduling problem studied in this dissertation is the preemptive scheduling algorithms with nested and inclusive processing set restrictions. The objective is to minimize the makespan of the schedule. It can be shown that there is no optimal online algorithm even for the case of inclusive processing set. Then a linear time optimal algorithm is given for the case of nested processing set, where all jobs are available for processing at time t = 0. A more complicated algorithm with running time 0(n log ri) is given that produces not only optimal but also maximal schedules. When jobs have different release times, an optimal algorithm is given for the nested case and a faster optimal algorithm is given for the inclusive processing set case

    Low-power epidemic communication in wireless ad hoc networks

    Get PDF
    Steen, M.R. van [Promotor]Voulgaris, S. [Copromotor

    Building blocks for the internet of things

    Get PDF

    Radio network algorithms for global communication

    Get PDF
    Radio networks are a distributed computing model capturing the behavior of devices that communicate via wireless transmissions. Applications of wireless networks have expanded hugely in recent decades due to their convenience and versatility. However, wireless communication presents practical difficulties, particularly in avoiding interference between transmissions. The radio network model provides a theoretical distillation of the behavior of such networks, in order to better understand and facilitate communication. This thesis concerns fundamental global communication tasks in the radio network model: that is, tasks that require relaying messages throughout the entire network. Examples include broadcasting a message to all devices in a network, or reaching agreement on a single device to act as a coordinator. We present algorithms to perform global tasks efficiently, and show improved asymptotic running times over a range of environments and model variants. Our results demonstrate an advance over the state of the art in radio network research, and in many cases reach or approach known lower bounds

    Wireless Sensor Data Transport, Aggregation and Security

    Get PDF
    abstract: Wireless sensor networks (WSN) and the communication and the security therein have been gaining further prominence in the tech-industry recently, with the emergence of the so called Internet of Things (IoT). The steps from acquiring data and making a reactive decision base on the acquired sensor measurements are complex and requires careful execution of several steps. In many of these steps there are still technological gaps to fill that are due to the fact that several primitives that are desirable in a sensor network environment are bolt on the networks as application layer functionalities, rather than built in them. For several important functionalities that are at the core of IoT architectures we have developed a solution that is analyzed and discussed in the following chapters. The chain of steps from the acquisition of sensor samples until these samples reach a control center or the cloud where the data analytics are performed, starts with the acquisition of the sensor measurements at the correct time and, importantly, synchronously among all sensors deployed. This synchronization has to be network wide, including both the wired core network as well as the wireless edge devices. This thesis studies a decentralized and lightweight solution to synchronize and schedule IoT devices over wireless and wired networks adaptively, with very simple local signaling. Furthermore, measurement results have to be transported and aggregated over the same interface, requiring clever coordination among all nodes, as network resources are shared, keeping scalability and fail-safe operation in mind. Furthermore ensuring the integrity of measurements is a complicated task. On the one hand Cryptography can shield the network from outside attackers and therefore is the first step to take, but due to the volume of sensors must rely on an automated key distribution mechanism. On the other hand cryptography does not protect against exposed keys or inside attackers. One however can exploit statistical properties to detect and identify nodes that send false information and exclude these attacker nodes from the network to avoid data manipulation. Furthermore, if data is supplied by a third party, one can apply automated trust metric for each individual data source to define which data to accept and consider for mentioned statistical tests in the first place. Monitoring the cyber and physical activities of an IoT infrastructure in concert is another topic that is investigated in this thesis.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Scalable and Secure Multicast Routing for Mobile Ad-hoc Networks

    Get PDF
    Mobile Ad-Hoc Networks (MANETs) are decentralized and autonomous communication systems: They can be used to provide connectivity when a natural disaster has brought down the infrastructure, or they can support freedom of speech in countries with governmental Internet restrictions. MANET design requires careful attention to scalability and security due to low-capacity and error-prone wireless links as well as the openness of these systems. In this thesis, we address the issue of multicast as a means to efficiently support the MANET application of group communication on the network layer. To this aim, we first survey the research literature on the current state of the art in MANET routing, and we identify a gap between scalability and security in multicast routing protocols–two aspects that were only considered in isolation until now. We then develop an explicit multicast protocol based on the design of a secure unicast protocol, aiming to maintain its security properties while introducing minimal overhead. Our simulation results reveal that our protocol reduces bandwidth utilization in group communication scenarios by up to 45 % compared to the original unicast protocol, while providing significantly better resilience under blackhole attacks. A comparison with pure flooding allows us to identify a practical group size limit, and we present ideas for better large-group support
    corecore