• Title/Summary/Keyword: wireless networks

Search Result 5,171, Processing Time 0.034 seconds

MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks

  • Kim, Sung-Won;Kim, Byung-Seo;Lee, In-Kyu
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.63-74
    • /
    • 2012
  • Multicast data communication is an efficient communication scheme, especially inmulti-hop ad hoc networks where the media access control (MAC) layer is based on one-hop broadcast from one source to multiple receivers. Compared to unicast, multicast over a wireless channel should be able to deal with varying channel conditions of multiple users and user mobility to provide good quality to all users. IEEE 802.11 does not support reliable multicast owing to its inability to exchange request-to-send/clear-to-send and acknowledgement packets with multiple recipients. Thus, several MAC layer protocols have been proposed to provide reliable multicast. However, additional overhead is introduced, as a result, which degrades the system performance. In this paper, we propose an efficient wireless multicast MAC protocol with small control overhead required for reliable multicast in multi-hop wireless ad hoc networks. We present analytical formulations of the system throughput and delay associated with the overhead.

Joint Scheduling and Rate Optimization in Multi-channel Multi-radio Wireless Networks with Contention-based MAC

  • Bui, Dang Quang;Choi, Myeong-Gil;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1716-1721
    • /
    • 2008
  • Currently, Wireless Networks have some nice characteristics such as multi-hop, multi-channel, multi-radio, etc but these kinds of resources are not fully used. The most difficulty to solve this issue is to solve mixed integer optimization. This paper proposes a method to solve a class of mixed integer optimization for wireless networks by using AMPL modeling language with CPLEX solver. The result of method is scheduling and congestion control in multi-channel multi-radio wireless networks.

  • PDF

Power Allocation Optimization and Green Energy Cooperation Strategy for Cellular Networks with Hybrid Energy Supplies

  • Wang, Lin;Zhang, Xing;Yang, Kun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4145-4164
    • /
    • 2016
  • Energy harvesting is an increasingly attractive source of power for cellular networks, and can be a promising solution for green networks. In this paper, we consider a cellular network with power beacons powering multiple mobile terminals with microwave power transfer in energy beamforming. In this network, the power beacons are powered by grid and renewable energy jointly. We adopt a dual-level control architecture, in which controllers collect information for a core controller, and the core controller has a real-time global view of the network. By implementing the water filling optimized power allocation strategy, the core controller optimizes the energy allocation among mobile terminals within the same cluster. In the proposed green energy cooperation paradigm, power beacons dynamically share their renewable energy by locally injecting/drawing renewable energy into/from other power beacons via the core controller. Then, we propose a new water filling optimized green energy cooperation management strategy, which jointly exploits water filling optimized power allocation strategy and green energy cooperation in cellular networks. Finally, we validate our works by simulations and show that the proposed water filling optimized green energy cooperation management strategy can achieve about 10% gains of MT's average rate and about 20% reduction of on-grid energy consumption.

Improved AODV Routing Protocol for Optimized Path over Wireless Mesh Network (무선 메쉬 네트워크에서 최적의 경로 설정을 위한 개선된 AODV 라우팅 프로토콜)

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.4
    • /
    • pp.350-356
    • /
    • 2008
  • The recent networks are trending toward wireless networks. So wireless internet used to service of wired networks. But wireless networks can't show same performance of wired networks. Therefore, we are must concerned about Routing Protocol for improvement of a weak point of physical feature. But many researchers are not focusing on developing Routing Protocol. In this paper, we improve on AODV(Ad-hoc On-demand Distance Vector) for Wireless Mesh Networks. And it analyzed the result of simulation.

  • PDF

Adaptive Proportional Fair Scheduling for WWAN/WLAN Two-Hop Wireless Relay Networks (WWAN/WLAN 2-홉 무선 중계 네트워크를 위한 적응형 비례 공정 스케줄링 기법)

  • Koo, Young-Dae;Park, Joon-Sang;Han, Seung-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.743-747
    • /
    • 2008
  • Hierarchical overlay of heterogeneous wireless cells is considered as a promising architecture for next-generation wireless networks. This paper considers a special form of such architecture, WWAN/WLAN two-hop wireless relay networks. We first describe an undesirable scheduling phenomenon that the conventional proportional fair algorithm can cause in such networks. We, then, propose an enhanced proportional fair scheduling to remedy this problem. We demonstrate the performance of the proposed scheme via a simulation of UMTS/WLAN networks using NS-2.

Survivability Evaluation Model in Wireless Sensor Network using Software Rejuvenation

  • Parvin, Sazia;Thein, Thandar;Kim, Dong-Seong;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.91-100
    • /
    • 2008
  • The previous works in sensor networks security have focused on the aspect of confidentiality, authentication and integrity based on cryptographic primitives. There has been no prior work to assess the survivability in systematic way. Accordingly, this paper presents a survivability model of wireless sensor networks using software rejuvenation for dual adaptive cluster head. The survivability model has state transition to reflect status of real wireless sensor networks. In this paper, we only focus on a survivability model which is capable of describing cluster head compromise in the networks and able to switch over the redundant cluster head in order to increase the survivability of that cluster. Second, this paper presents how to enhance the survivability of sensor networks using software rejuvenation methodology for dual cluster head in wireless sensor network. We model and analyze each cluster as a stochastic process based on Semi Markov Process (SMP) and Discrete Time Markov Chain (DTMC). The proof of example scenarios and numerical analysis shows the feasibility of our approach.

  • PDF

A Study on an AODV Routing Protocol with Energy-Efficiency (에너지 효율을 고려한 AODV 라우팅 프로토콜에 관한 연구)

  • Hwang, Tae Hyun;Kim, Doo Yong;Kim, Kiwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.14 no.2
    • /
    • pp.17-22
    • /
    • 2015
  • In recent years, wireless sensor networks have become an important part of data communications. Sensors provide information about the required measurements or control states over wireless networks. The energy efficient routing protocol of wireless sensor networks is the key issue for network lifetimes. The routing protocol must ensure that connectivity in a network is remained for a long period of time and the energy status of the sensor in the entire network must be in the same level in order not to leave the network with a wide difference in the energy consumptions of the sensors. In this paper we propose a new routing protocol based on AODV protocol that considers the energy efficiency when the protocol determines the routing paths, which is called AODV-EE. The proposed method prevents an imbalance of power consumption in sensors of wireless networks. From the simulation results it is shown that the proposed algorithm can be effectively used in collecting and monitoring data without concerning about the disconnection of the networks.

An Optimal Schedule Algorithm Trade-Off Among Lifetime, Sink Aggregated Information and Sample Cycle for Wireless Sensor Networks

  • Zhang, Jinhuan;Long, Jun;Liu, Anfeng;Zhao, Guihu
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.227-237
    • /
    • 2016
  • Data collection is a key function for wireless sensor networks. There has been numerous data collection scheduling algorithms, but they fail to consider the deep and complex relationship among network lifetime, sink aggregated information and sample cycle for wireless sensor networks. This paper gives the upper bound on the sample period under the given network topology. An optimal schedule algorithm focusing on aggregated information named OSFAI is proposed. In the schedule algorithm, the nodes in hotspots would hold on transmission and accumulate their data before sending them to sink at once. This could realize the dual goals of improving the network lifetime and increasing the amount of information aggregated to sink. We formulate the optimization problem as to achieve trade-off among sample cycle, sink aggregated information and network lifetime by controlling the sample cycle. The results of simulation on the random generated wireless sensor networks show that when choosing the optimized sample cycle, the sink aggregated information quantity can be increased by 30.5%, and the network lifetime can be increased by 27.78%.

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

Hierarchical Real-Time MAC Protocol for (m,k)-firm Stream in Wireless Sensor Networks

  • Teng, Zhang;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.212-218
    • /
    • 2010
  • In wireless sensor networks (WSNs), both efficient energy management and Quality of Service (QoS) are important issues for some applications. For creating robust networks, real-time services are usually employed to satisfy the QoS requirements. In this paper, we proposed a hierarchical real-time MAC (medium access control) protocol for (m,k)-firm constraint in wireless sensor networks shortly called HRTS-MAC. The proposed HRTS-MAC protocol is based on a dynamic priority assignment by (m,k)-firm constraint. In a tree structure topology, the scheduling algorithm assigns uniform transmitting opportunities to each node. The paper also provides experimental results and comparison of the proposed protocol with E_DBP scheduling algorithm.