• Title/Summary/Keyword: Multi hop Wireless Ad-hoc Networks

Search Result 93, Processing Time 0.021 seconds

Enhanced CSMA/CA Protocol for multi-hop wireless Ad-hoc networks (멀티 홉 무선 Ad-hoc 네트워크를 위한 개선된 CSMA/CA 프로토콜)

  • 김남일;황유선;김응배
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.231-234
    • /
    • 2003
  • In this paper, we propose the enhanced CSMA/CA MAC protocol fir mobile multi-hop wireless Ad-hoc networks. In the conventional wireless Ad-hoc network such as WLAN using CSMA/CA MAC protocol, communications between terminals that fn connected within multi-hop node may degrade the transmission efficiencies as increasing the multi-hop nodes because of RTS-CTS-DATA-ACK message exchange between terminals. In this raper, we apply the ACK/RTS control message into multi-hop transmission between terminals for wireless ad-hoc networks and improve the data traffic transmission efficiencies compared with conventional CSMA/CA MAC protocol used in WLAN.

  • PDF

MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks

  • Kim, Sung-Won;Kim, Byung-Seo;Lee, In-Kyu
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.63-74
    • /
    • 2012
  • Multicast data communication is an efficient communication scheme, especially inmulti-hop ad hoc networks where the media access control (MAC) layer is based on one-hop broadcast from one source to multiple receivers. Compared to unicast, multicast over a wireless channel should be able to deal with varying channel conditions of multiple users and user mobility to provide good quality to all users. IEEE 802.11 does not support reliable multicast owing to its inability to exchange request-to-send/clear-to-send and acknowledgement packets with multiple recipients. Thus, several MAC layer protocols have been proposed to provide reliable multicast. However, additional overhead is introduced, as a result, which degrades the system performance. In this paper, we propose an efficient wireless multicast MAC protocol with small control overhead required for reliable multicast in multi-hop wireless ad hoc networks. We present analytical formulations of the system throughput and delay associated with the overhead.

Analysis of Three-Phase Multiple Access with Continual Contention Resolution (TPMA-CCR) for Wireless Multi-Hop Ad Hoc Networks

  • Choi, Yeong-Yoon;Nosratinia, Aria
    • Journal of Communications and Networks
    • /
    • v.13 no.1
    • /
    • pp.43-49
    • /
    • 2011
  • In this paper, a new medium access control (MAC) protocol entitled three-phase multiple access with continual contention resolution (TPMA-CCR) is proposed for wireless multi-hop ad hoc networks. This work is motivated by the previously known three-phase multiple access (TPMA) scheme of Hou and Tsai [2] which is the suitable MAC protocol for clustering multi-hop ad hoc networks owing to its beneficial attributes such as easy collision detectible, anonymous acknowledgment (ACK), and simple signaling format for the broadcast-natured networks. The new TPMA-CCR is designed to let all contending nodes participate in contentions for a medium access more aggressively than the original TPMA and with continual resolving procedures as well. Through the systematical performance analysis of the suggested protocol, it is also shown that the maximum throughput of the new protocol is not only superior to the original TPMA, but also improves on the conventional slotted carrier sense multiple access (CSMA) under certain circumstances. Thus, in terms of performance, TPMA-CCR can provide an attractive alternative to other contention-based MAC protocols for multi-hop ad hoc networks.

Analysis for Ad Hoc Routing Protocol based-on Dynamic Source Routing (Dynamic Source Routing 기반의 Ad Hoc Routing Protocol 분석)

  • 이광재;김탁근;김동일;최삼길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.121-124
    • /
    • 2001
  • Dynamic Source Route(DSR) protocol is a simple and efficient routing protocol designed specially for use of the multi-hop Ad Hoc Network. DSR allows the network to be completely self-organized and self-configured without the need for any existing infrastructure or administration. DSR protocol consists of the two mechanisms of Router discovery and Router Maintenance, works entirely On-demand in all aspects. In this paper, we will present the performance of DSR protocol on the multi-hop wireless Ad Hoc Networks, illustrate it with simulation, and then analysis the algorism of DSR.

  • PDF

An Optimal Path Routing in Wireless Mesh Network (무선 메쉬 네트워크에서 최적화된 경로선정을 위한 라우팅)

  • Lee, Ae-Young;Roh, II-Soon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.43-48
    • /
    • 2009
  • Wireless mesh networks, unlike Ad-hoc network, has low mobility and multi-path communication between terminals and other networks because it has the backbone structures. Most studies are advanced on finding the optimal routing path in multi-hop wireless mesh network environment. Various routing metric, minimum number of hops(Hop_count) and ETX, ETT metric, are proposed to wireless mesh networks. However, most metrics cannot identify the high throughput routing paths because this metric uses a different measurement parameters in each direction. So actual delivery rate does not provide to this metric. This paper describes the metric and implementation of IETC as a metric. This paper shows the improvement in performance.

  • PDF

A Multi-hop Cooperative Transmission Protocol in Mobile Ad-hoc Wireless Networks (모바일 애드혹 무선 네트워크에서 멀티 홉 협력 전송 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.17-22
    • /
    • 2013
  • In this paper, we propose a multi-hop cooperative transmission protocol over Rayleigh fading channels. In the proposed protocol, the multi-hop cooperative transmission is used to improve the system performance. Due to broadcast nature, we do not limit the receiving node to be only the next node, but the destination and all the nodes between the transmitting node and the destination. The proposed protocol can hence save the average transmit power, compared with multi-hop direct transmission protocol due to the skipped transmissions from some intermediate nodes or chosen relays. The proposed scheme is implemented and evaluated in mobile ad-hoc wireless networks.

Design and Realization of a Novel Header Compression Scheme for Ad Hoc Networks

  • Khalid, Shahrukh;Mahboob, Athar;Azim, Choudhry Fahad;Rehman, Aqeel Ur
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.922-933
    • /
    • 2016
  • IP header compression schemes offer a valuable measure for bandwidth preservation. Such schemes have been practically implemented in infrastructure-based IP networks for point-to-point links. However, minimal research and practical implementation efforts have been conducted in the direction of an IP header compression strategy that can meet the peculiar requirements of multi-hop ad hoc wireless networks. In this paper, we present a practically implemented multi-hop IP header compression scheme using the Robust Header Compression (ROHC) protocol suite. The scheme runs on a novel identifier (ID) based networking architecture, known as an ID-based ad hoc network (IDHOCNET). IDHOCNET additionally solves a number of bottlenecks of pure IP-based ad hoc networks that have emerged owing to IP address auto-configuration service, distributed naming and name resolution, and the role of an IP address as an identifier at the application layer. The proposed scheme was tested on a multi-hop test bed. The results show that the implemented scheme has better gain and requires only O (1) ROHC contexts.

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

Angular MST-Based Topology Control for Multi-hop Wireless Ad Hoc Networks

  • Kim, Hwang-Nam;Park, Eun-Chan;Noh, Sung-Kee;Hong, Sung-Back
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.341-343
    • /
    • 2008
  • This letter presents an angular minimum spanning tree (AMST) algorithm for topology control in multi-hop wireless ad hoc networks. The AMST algorithm builds up an MST for every angular sector of a given degree around each node to determine optimal transmission power for connecting to its neighbors. We demonstrate that AMST preserves both local and network-wide connectivity. It also improves robustness to link failure and mitigates transmission power waste.

  • PDF

A Study on Secure Routing for a Maritime Network Based on Mobile Multi-hop Wireless Networks (이동 다중 홉 무선망 모델에 기반한 해양통신망을 위한 경로배정 보안 연구)

  • Mun, Seong-Mi;Son, Joo-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.33 no.1
    • /
    • pp.120-130
    • /
    • 2009
  • In recent years, many mobile wireless communication devices and applications have been deployed on the planet. The mobile multi-hop wireless network models appeared to provide means to access to networks where few infrastructure exists. However, the mobile multi-hop wireless networks have weaker points in attacks and intrusions than the wired and one-hop wireless networks. In this paper, the secure routing issues in most mobile multi-hop wireless network models are surveyed in depth. The state-of-the-art technologies and research activities are explained. Finally, the issues and technologies for the secure routing specific to a maritime network model are sufficiently discussed as conclusions.