A Practical Low Interference Topology Control for Mobile Ad hoc Networks
|
|
- Eustace Woods
- 5 years ago
- Views:
Transcription
1 A Practical Low Interference Topology Control for Mobile Ad hoc Networks Xiang Yu, Xinming Zhang, Can Que, Qiong Liu Department of Computer Science and Technology University of Science and Technology of China Anhui Province-MOST Co-Key Laboratory of High Performance Computing and Its Application Hefei, , PRChina Abstract The interference imposes a potential negative impact on the performance of a wireless network A device is interfered if it receives a transmission not intended for it In this paper, we introduce an explicit computation model of node interference based on its actual inducement on the physical layer We prove that there exists an optimal algorithm to solve the corresponding topology control problem, constructing a network topology with minimum node interference We also investigate the bad performance of existing methods of solving it and propose a revised algorithm, namely Low Interference-amount Neighborhood Tree (LINT), based on a new link cost metric The simulation results illustrate that our model is able to reduce node interference effectively and maintain the network performance Keywords-Interference; MANETs; Topology control I INTRODUCTION A mobile ad hoc network (MANET) [1] is a collection of wireless mobile devices that self-configure to form a network without aid of any pre-established infrastructure In a MANET, the packets transmitted by a wireless device are often received unconsciously by others in its vicinity, which possibly cause signal interferences at these valid neighbors, share their limited bandwidth, and even bring collisions and data retransmissions at the MAC layer Consequently, the network throughput degrades and the end-end delay increases In MANETs, each device can selectively decide which device to communicate either by adjusting its transmission power or its antenna direction Obviously, keeping relatively limited direct neighbors is helpful to speed up the routing protocols in addition to possibly alleviating the interference among simultaneous transmissions, and also possibly save the energy consumption How to construct such a topology depicted above is the central task of topology control In previous work, it has been well studied in conserving energy consumption and claimed implicitly to solve the interference issue [2] [3] [4] [5] Unfortunately, none of them take into account the explicit definition of interference and effectively confine interference at a low level, proven by Burkhart [6] This paper is partially supported by the National Natural Science Foundation of China under rant No and ; the National rand Fundamental Research 973 Program of China under rant No2006CB303006; the Open Foundation of Anhui Province Key Laboratory Proceedings of Software of the in Sixth Computing International and Communication Conference on Networking (ICN'07) [6] started a totally fresh realm named interferenceefficient topology control, which establishes an interference computation model and then employs the topology control methods well studied previously But his definition of interference is based on the number of nodes affected by communication over a given link, therefore it is argued that such sender-centric perspective hardly reflects real-world interference and performs badly in certain cases In this paper, different from previous studies, we firstly account for the credible and theoretical cause of interfering and being interfered through signal to noise ratio or SINR, and define interference amount of a node as the number of hidden neighbors located in a certain distinct contributing interference to it According to our new model, a topology control problem with interference amount consideration is raised, which is to find a structure such that the most interference suffered by nodes is minimized while the network connectivity constraint is satisfied Whether its optimal solution exists is also under discussion For the worse performance of existing algorithm in certain cases, we propose a heuristic algorithm, Low Interferenceamount Neighborhood Tree (LINT), based on the new interference measurement metric Its performances are verified via simulations Simulation results indicate that compared with the well known link-interference based algorithm, LINT works better in general cases The remainder of the paper is organized as follows We introduce the related works in Section II In Section III, the new interference computation model is presented after analysis of interference inducement, which supports rationality of optimality and algorithm LINT in Section IV Finally, the simulation results and conclusions are presented in the in Section V, VI, respectively IIRELATED WORKS In this section, we discuss related works in the field of topology control with special focus on the issue of interference Reducing interference effects is one of the main goals of topology control besides direct energy conservation by restriction of transmission power Burkhart et al [6] presents a traffic-independent model and defines the interference of a link e=(u, v) as the cardinality of the set of nodes covered by two disks centers at u and v with radius, denoted as coverage set of link e,cov(e) This model, named as link-interference via coverage is chosen
2 from the assumption that, whenever a link (u, v) is used for a send-receive transaction all nodes whose distance to node u or node v is less than will be affected in a way [7] extends this work and proposes node-interference via coverage model The interference of a node u is defined as the imum coverage set of links, incident on u However, coverage model is based on the question how many other nodes can be disturbed by a given communication node or link, thus considered to be an issue at the sender instead of at the receiver, where message collisions actually prevent proper reception Secondly, its weakness is that only introduction of one addition node might lead the interference valued pushed up from a small constant to the imum possible value This behavior contrasts to the intuition that a single additional node represents one addition packet source potentially causing collisions Moreover, neglect of the case that a particular node might be influenced by multiple communication links with small coverage set, might lead discontented results of the proposed algorithms [6] as indicated in Section IV in detail An attempt to correct for this deficiency is made in [8], where an alternative, receiver-centric, interference model is introduced In this model, node u will be interfered by v whose distance to v is less than R v, its distance to reach the farthest neighbor, or { v R v } formally It is denoted as node-interference via transmission model Under the assumption that only symmetric edges are considered, it can be proved that that nodes set mentioned above equivalent to{ v R u } Unfortunately, one fatal drawback is that previous works consider the interference range equals to the transmission range According to the theoretical analysis of actual cause of interference in reference [9], interference range differs from transmission range generally and hidden terminals located within the 178d distance (d denotes the communication distance) of the receiver are also disturbing sources, which is neglected in previous works at all times Researches mistake nodes within the transmission range for the only hidden interfering nodes III NEWORK AND INTERFERENCE MODEL Summarily, interference-efficient topology control is to find a sub-graph H from the original graph to minimize interference while preserving fixed properties Thus such definitions should be explicit and reasonable, that is (i) construction of structure, (ii) interference measurement mechanism, and (iii) properties maintained A Network Model In this paper, a wireless ad hoc network is modeled as a well-known Unit Disk raph (UD) [10] with vertices in V representing network nodes, and the edges E representing communication links In the original communication graph = (V, E ), an edge (u, v) exists iff the Euclidean distance between such a pair is at most the imum transmission range R In order to prevent existing basic communication between neighboring nodes from becoming unacceptably cumbersome [11], only symmetric edges are considered First, we point out the inconsistency in pervious topology control works among reducing interference, conserving energy and also preserving symmetric edges using the omnidirectional antennas Previous studies claims that power consumption and interference reduction can be jointly achieved through topology control under the assumption of symmetric edges Nevertheless, any symmetric method must contain Nearest Neighbor Forest structure, which may have Ω( n) larger interference than the optimal topology proven in [8] Thus who claim interference efficiency may be dubious Using directional antennas, where the transmission is omnidirectional, but the reception is directional, is capable to prevent the inconsistency depicted above Adaptively adjusting both its transmission power and antennas direction according to different receivers would be complex, so the transmission power of any device is taken fixed, and nodes only adjust the direction of antennas to reflect its neighbors in our formulation And in the resulting topology H, reducing interference but not conserving energy consumption is our main issue in this paper Although it may contradict the primary aim of topology control energy conservation, it reflects another perspective of modeling and its development under the power adjustment is our future work B Measurement of Interference Intuitionally, a node in the network is interfered by others, if messages are received but not intended for it [12] This interpretation is our foundation of new metric of interference measurement From the perspective of the physical layer, a signal arriving at a receiver is assumed to be valid if the SINR is above a certain threshold T SINR We assume a transmission to a receiver with transmitter-receiver d meters and at the same time, an interfering node r meters away from the receiver starts another transmission According to analysis in [9], under the assumption of homogeneous radios and TWO-RAY ROUND pathloss model, a crucial conclusion is made that interference range is 4 TSNR d, with an approximation value 178 d when T SNR is set to 10 for instance Previous researchers mistake nodes within the transmission range for the only hidden interfering ones Distinctly, for a node, all active neighbors within its interference range are potential interfering sources Consequently, interference amount, defined as the imum cardinality of active interference neighbors set, is our new interference measurement metric Compared to the existed model, implicit but threatening neighbors are considered at the first time by us Definition 1 iven a structure H=(V,E), the interference neighbors set of a node u communicating with v in, denoted as INei ( u ), is defined as follows:
3 INei 4 ( u) = { w V w D( w, TSNR )}, where D(u,r) denotes the set of nodes located in the circular area centered at node u with radius r, and the communication distance If node u communicates with neighbors over multiple links, how much interference u may experience from other irrelevant nodes in the worst case is what we would like to know Definition 2 iven a topology H=(V,E), the interference amount of node u, denoted as IA(u), equals to the imum value of INei ( u ) incident on link (u, v), ie, IA( u)= INei ( u) Interference amount of the topology, E denoted as IA(H), is defined as u VIA( u) Notice that IA(H) is our metric to measure the interference of a network in the following sections Obviously, INei ( u ) includes all the threatening neighbors who may inflict interference potentially, while link (u, v) is active, thus IA( u) = INei ( u) gives an upper bound of E interference suffered by this node Moreover, this receivercentric model is based on the strict definition of interference, directly measuring the level of being interfered It is our main contribution in this paper C Properties Maintained Finally, we mainly discuss the connectivity property in this paper Connectivity is crucial since any working networks rely on it Our task is to fulfill the connectivity while reducing the interference amount possibly, denoted by MIN_IFAMOUNT Whether an optimal solution exists is also under discussion in Section IV IV LOW INTERFERENCE-AMOUNT TOPLOLOIES A Optimality In this section, firstly, we give an optimal solution to MIN_IFAMOUNT and prove it Note that the node interference now depends on the final topology H, which introduces a level difficulty compared with link interference studied previously To construct a topology with interference amount as low as possible, surprisingly, we observe that an analogy exists between our solution and MST after assigning weights to links Definition 3 iven a structure H, weight of link e= (u, v), denoted as W(e), equals to imal value of INei ( u ) and INei vu ( u ), ie, W( e)=( INei ( u), INei vu ( v ) ) It is not so obvious to obtain the conclusion that, the minimum spanning tree (MST) still produces the optimal network topology (OPT) with the minimal interference The edge weight in MST process is defined above Lemma iven a structure H, for any edge f, the inequation W( f ) IA( H) is correct Proof Consider the interference amount of structure H, denoted as IA(H) Obviously, for any node u V, H IA( u) IA( H) Now that the structure is connected, it is obvious that one link f adjacent to u and v ensures such that W( f)=( INei ( u), INei vu( v) ) ( INei ( u), INei ( v) ) uw E uw vw E INei uw ( u) = IA( u) Clearly, uw E IA( H) Putting these INei vw ( v) = IA( v) vw E properties together, we have W( f ) IA( H) Note that if node u maintains IA( u) = IA( H), (, ) E st W( ) = IA( H) H We can now prove that MST correctly finds the optimal solution to MIN-IFAMOUNT problem, thus construct a topology with least interference Theorem MST produces an optimal topology for MIN- IFAMOUNT problem Proof Assume the MST is not optimal and OPT is an optimal topology That is to say, IA(OPT) < IA(MST) Consider the edge with the highest weight in MST, e = (u, v) By the Lemma above, since e has the highest weight in MST, then W( e )=IA(MST) The link e does not belong to OPT, otherwise it contradict with optimality And the weights of all links in OPT is less than the weight of link e This means a connected graph can be constructed with using links whose weight is less than W(e), and this violates the process of MST Since an optimal solution is given with a polynomial time complexity, any comparison merely concentrating on interference amount is meaningless by reason of the unfair measuring criteria In what follows, for the worse performance in some cases, a polynomial time but approximate algorithm is proposed based on the metric interference cost B Interference Cost Metric It can be shown that the work presented in reference [6] performs badly when a particular node is interfered by multiple links with smaller link interference For example, consider seven nodes with equal imum transmission power distributed in a square area as shown in Fig1(a) Fig1(b) gives a topology in which the links that interfere with the least number of nodes are selected, as proposed in [6] The number associated with each node indicates the interference level of the node in the topology (ie, the number of communication links contributing interference to the node, differs from ours) We find that node o is the one interfered mostly in this graph Now consider another possible one in Fig1(c), in which link is selected instead of cd In this topology, node o is still the node interfered mostly, but this time it is interfered by four links, instead of five as in Fig1(b) Thus the proposed algorithm in [6] may not find a sub-graph with nodes suffering vw
4 from low interference, thus failing in finding the minimum interference level structure edges is 6, so (o,c) instead of (c,d) is added and the worse results are avoided b a c o d f e b( 2) o( 5) f(2) e( 2) b( 2) o( 4) f(3) (a) (b) (c) Figure 1 Two topologies with nine nodes (a)a network with seven nodes (b) A topology with five links interfering with node o (c) A topology with four links interfering with node o Moreover, since adding one edge e to a topology may cause different levels of interference to each node v cov( e) For nodes with higher interference level, including edge e will result in higher incremental of contention to them even though e may interfere fewer number of nodes in the network In other words, it is the main deficiency that nodes influence never participate into the process of edge chosen Contrarily, our proposed solution inspires concerns with establishing a feedback mechanism to avoid such phenomena mentioned above in a way To measure the interference increment caused by such an edge included into the topology, we map node s influence into link, named as interference cost on link as follows Definition 4 iven a structure and an active link e=(u, v), link interference cost, denoted as IC(e), is defined as cardinality of the union set of interference neighbors of nodes within the link s coverage set, ie, IC( e= ) IC( ) = INei wx ( w) w cov( ) wx E,where cov( ) is the coverage set of link (u, v), representing the nodes located in the region D(u, d(u, v)) or D(v, d(v, u)) produced by the communication link (u, v) b( 3) 7 f(3) f(3) 6 6 e( 3) 6 o( 6) 6 b( 3) o( 6) b( 3) e( 3) f(3) o( 6) e( 3) C LINT Algorithm Accordingly, a heuristic algorithm is proposed, namely, Low Interference amount Neighborhood Tree (LINT) LINT is then compared to LIFE in [6], which also aim at the problem above but may perform badly sometimes illustrated above Note that the framework of two algorithms is similar, except that link interference cost substitute for link interference via coverage in [6] The main idea of LINT is to add an edge with the least interference cost for each pair of nodes that is not connected Starting from the edge with minimum value, in each iteration of the algorithm an edge (u, v) is proceeded If node u and v are already connected, (u, v) is just ignored or otherwise it will be added to the resulting topology After adding, update the interference amount of node w cov() and also interference cost of remaining edges in As a result, the topology constructed by LINT maintains the connectivity of the original network with the least possible interference amount The overall time complexity is polynomial through simple analysis Tab 2 Algorithm LINT INPUT: a set of nodes V, the imum transmission radius R OUTPUT: graph H Function LINT: create the original graph with R E H =Φ while E Φ e=(u,v) E with the minimum interference cost if u and v are not connected in H then E H = E H {e} update the interference amount of node w cov(e) update the interference cost of related links end if E = E \{e} end while H =(V, E H ) END 6 6 c(3) 7 d( 3) (a) (b) (c) Figure 2 An illustrated example Based on the observations above, if more than one edge can be selected to connected two connected components, the edge which interferes to the node with the largest interference cost should be avoided As a example, in Fig 2(a), the edges (a,b), (b,c), (d,e), (e,f), (o,f) are included into the resulting topology Till now, the smallest cost of remaining candidate V SIMULATION STUDIES A Simulation Environment and Parameters In this section, we conducted extensive simulations to study and compare the performance of the proposed topology control algorithm LINT with Burkhart s LIFE in [6] The networks are constructed by randomly distributing nodes in a square area Without loss of generality, the mean result is derived from 20 networks, randomly generated with
5 different number of nodes N and the imum transmission range R In order to measure the interference reduction quantitatively, interference amount reduction ratio R IA is defined as 1 2 R IA= 100% I( H2) I( H ) I( H ), where I( H1) denotes the interference amount of the topology generated by LIFE, and I( H 2) represents the interference amount of the resulting structure constructed by LINT with the metric defined in Definition 4 The total interference amount of a structure H, is formulated as TI( H) = IA( u) u V H Approximate estimation of the throughput is another parameter concerned Since the static instinct of topology control, we calculate the independent set (ISet) of a structure instead Then in a way, Thr( H ) ( ISet ) i i and the curves is flat, for the reason of fewer edges in and no guarantee of connectivity For instance, the value is about 30 in our simulations when R is 10 Figure 4 Total Interference amount for LINT and LIFE (R =10) B Topology Comparison First of all, to evaluate the average performance between the proposed LINT and LIFE, we put different number of nodes N from 20 to 80 with the increment 5 and the imum transmission range R is set from 5 to 15 with the increment 25 Ratio RIA% R=5 R=10 R= Number of Nodes Figure 3 Interference amount improvement ratio for LINT Fig 3 depicts the interference amount reduction ratio R IA of LINT in comparison to LIFE The results show that R IA is positive, with approximate peak value 1182% in our simulation We find that R IA improves as R and N increase, because the choices of paths between any two nodes of the network also increase Hence, our revised mechanism may work more efficiently A critical observation is that when R t equals to a value 15 and the density of nodes is large, in our simulation, it has little influence on R IA because such a value R has great probability to include all the possible neighbors in the resulting topology In the same way, when N is less than a fixed value, determined by R, R IA equals to 0 nearly Figure 5 Throughput for LINT and LIFE (R =10) Fig 4 and Fig 5 illustrate the performance comparisons of LINT and LIFE simultaneously in terms of total interference amount TI( H) and throughput Thr( H ) with the transmission range 10 Note that when N is less than 30, meaninglessness occurs due to disconnectivity These results above demonstrate that LINT can significantly reduce the interference amount for a given network while the total interference amount and the throughput are still maintained, far from degradation The difference between topologies of resulting graph is depicted distinctly in Fig6 Another group is illustrated in Fig7 We plot the circles on vertices to demonstrate whose adjacent links are varied in the process of choosing links For example, node A suffers the most interference amount 15 in the resulting topology computed by LIFE Due to edges chosen in a marginal distinct, node B with only interference 13 is the greatest Simultaneously, the total interference amount is 303 and 299, respectively while two throughputs are all 27 An observation is that LINT choose edges in a marginal district to avoid more nodes interfered by the communicating neighbors, which is illustrated in Section IV, thus we can get the conclusion that LINT can reduce interference amount correspondingly
6 VI CONCLUSIONS Topology control draws considerable attentions recently in wireless ad hoc networks for interference reduction In this paper, we propose a new interference computation model that aims to reflect the interference inducement on the physical layer The advantages of this model are twofold: On the one hand this definition corresponds to the intuition due to its receiver-centricity On the other hand, it accords with the real cause of interfering quantitatively Then we investigate the corresponding topology control problem of minimizing the interference of the constructed structure, namely, MIN_IFAMOUNT, and optimally solve it in Section IV Additionally, in order to correct the drawback of algorithms proposed in [6], link interference cost as the metric is applied The results via simulation show that, compared with existing version LIFE, the revised algorithm LINT outperforms on the fact that interference amount can be reduced up, while the total interference and the throughput of the network are still not degraded As a future work, we would like to analyze the approximation of the optimal solution to LINT, and apply the interference measurement mechanism into routing protocols Additionally, our crucial interference computation model, may require to be reconsidered under transmitting power adaptation and reestimated in a more practical and reasonable way B A Figure 6 Topology generated by LIFE and LINT Figure 7 Topology generated by LIFE and LINT REFERENCES [1] I Chalmtac, M Conti, J J N Liu, Mobile ad hoc networking: imperatives and challenges, Journal of Ad hoc Networks, 1(1): 13-64, Jan 2003 [2] L Hu, Topology control for multihop packet radio networks, IEEE Trans on Communications, Vol 41, pp , 1993 [3] RRamanathan, R Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment, Proc of IEEE Infocom, pp90-100, 2000 [4] V Rodoplu, TH Meng, Minimum energy mobile wireless networks, IEEE JSelect Areas Communications, Vol17, no8, pp , 1999 [5] X Li, Y Wang, W Song, Applications of k-local mst for topology control and broadcasting in wireless ad hoc networks, IEEE Transactions on Parallel and Distributed Systems, 2004 [6] M Burkhart, Pvon Richenbach, R Wattenhofer, A Zollinger, Does topology control reduce interference?, Proc of ACM MobiHoc, 2004 [7] K Moaveni, X Li, Low-Interference Topology Control for Wireless Ad Hoc Networks, Ad Hoc & Sensor Wireless Networks, Vol 1, pp 41-64, 2005 [8] Pvon Richenband, S Schmid, R Wattenhofer, A Zollinger, A robust interference model for wireless ad-hoc networks, Proc of IPDPS, 2005 [9] K Xu, M erla, S Bae, Effectiveness of RTS/CTS handshake in IEEE based ad hoc networks, Journal of Ad Hoc Networks, 2003,1(1): [10] BN Clark, CJ Colbourn, DS Johnson, Unit Disk raphs, Discrete Mathematics, 86: , 1990 [11] R Prakash, Unidirectional Links Prove Costly in Wireless Ad-Hoc Networks, Proc of the 3rd Int Workshop on Discreet Algorithms and Methods for Mobile Computing and Communications (DIALM), 1999 [12] XM Zhang, Q Liu, D Shi, YZ Liu, X Yu, An Average Link Interference-aware Routing Protocol for Mobile Ad hoc Networks, Proc of 3rd International Conference on Wireless and Mobile Communications, March 2007
A Robust Interference Model for Wireless Ad-Hoc Networks
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer
More informationDoes Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference
More informationApproximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks
Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationA Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs
A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering
More informationApproximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks
Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1
More informationFault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks
Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationGATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani
GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,
More informationOn Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)
On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationTopology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications
Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationAmeliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationLocalized Topology Control for Minimizing Interference under Physical Model
Available online at www.sciencedirect.com Procedia Engineering 16 (2011 ) 144 150 International Workshop on Automobile, Power and Energy Engineering Localized Topology Control for Minimizing Interference
More informationInterference Minimization in Topology Control for Ad Hoc Networks
Minimization in Topology Control for Ad Hoc Networks Srinath.K, Venkataramanan.P, Mary Anita Rajam Department of Computer Science and Engineering, College of Engineering, Guindy, Anna University, Chennai,
More informationMessage-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department
More informationDesign and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks
Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee
More informationAn Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks
An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More informationAn Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs
An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,
More informationA Survey On Interference In Wireless Ad-Hoc Networks
A Survey On Interference In Wireless Ad-Hoc Networks S.K.Manju Bargavi Research Scholar, Anna University of Technology Coimbatore, India. Dr. G.P.Rajamani Principal, King College of Technology Namakkal,
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationThe 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.
Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationA Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs
A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,
More informationEfficient Directional Network Backbone Construction in Mobile Ad Hoc Networks
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Shuhui Yang, Jie Wu, and Fei Dai Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Department
More informationImplementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point
International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh
More informationEstimating the Free Region of a Sensor Node
Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We
More informationAnalysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh
More informationDistributed minimum spanning tree problem
Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with
More informationMulti-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks
Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationOn the Minimum k-connectivity Repair in Wireless Sensor Networks
On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu
More informationTOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,
More informationExperimental comparison of algorithms for interference control in ad-hoc wireless networks
Experimental comparison of algorithms for interference control in ad-hoc wireless networks Stavros Athanassopoulos and Christos Kaklamanis and Evi Papaioannou and Constantinos Tsantilas Research Academic
More informationChapter 7 TOPOLOGY CONTROL
Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing
More informationConnected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationPower Aware Metrics for Wireless Sensor Networks
Power Aware Metrics for Wireless Sensor Networks Ayad Salhieh Department of ECE Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren Schwiebert Department of Computer Science Wayne State University
More informationA LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK
Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationA Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks
A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp
More informationAlgorithms for minimum m-connected k-tuple dominating set problem
Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationOn minimum m-connected k-dominating set problem in unit disc graphs
J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December
More informationReversing Ticket Based Probing Routing Protocol for MANET
Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking
More informationIN distributed random multiple access, nodes transmit
414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationEfficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme
Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationLocalized Topology Control for Heterogeneous Wireless Sensor Networks
Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different
More informationLink Scheduling in Multi-Transmit-Receive Wireless Networks
Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology
More informationAlgorithms for Minimum m-connected k-dominating Set Problem
Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China
More informationPREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME
44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science
More informationPower Aware Routing using Power Control in Ad Hoc Networks
Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More informationA Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY 2007 1333 Multicast Communications in Ad Hoc Networks Using Directional Antennas: A Lifetime-Centric Approach Y. Thomas Hou, Senior Member,
More informationOn Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks
On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless
More informationPolynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks. Technical Report
Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 EECS
More informationDesign Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks
Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationModel and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs
Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Flávio V. C. Martins, cruzeiro@dcc.ufmg.br Frederico P. Quintão, fred@dcc.ufmg.br Fabíola G. Nakamura fgnaka@dcc.ufmg.br,fabiola@dcc.ufam.edu.br
More informationRandomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks
Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks Akshaye Dhawan, Michelle Tanco, Aaron Yeiser Department of Mathematics and Computer Science Ursinus College
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationWIRELESS broadband networks are being increasingly
1960 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 11, NOVEMBER 2006 Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks Mansoor Alicherry,
More informationAN EFFICIENT POWER CONTROLLED ROUTING IN MANETs
AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET
More informationApproximability Results for the p-center Problem
Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center
More informationOn the Complexity of Broadcast Scheduling. Problem
On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)
More informationTime-Bounded Essential Localization for Wireless Sensor Networks
IEEE TRANSACTIONS ON NETWORKING 1 Time-Bounded Essential Localization for Wireless Sensor Networks Wei Cheng, Member, IEEE, Nan Zhang, Member, IEEE, Xiuzhen Cheng, Senior Member, IEEE, Min Song, Senior
More informationWireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach
Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Biljana Stojkoska, Ilinka Ivanoska, Danco Davcev, 1 Faculty of Electrical Engineering and Information
More informationMaximal Independent Set
Chapter 4 Maximal Independent Set In this chapter we present a first highlight of this course, a fast maximal independent set (MIS) algorithm. The algorithm is the first randomized algorithm that we study
More informationConnectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University
More informationAd hoc and Sensor Networks Chapter 10: Topology control
Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity
More informationConsistency and Set Intersection
Consistency and Set Intersection Yuanlin Zhang and Roland H.C. Yap National University of Singapore 3 Science Drive 2, Singapore {zhangyl,ryap}@comp.nus.edu.sg Abstract We propose a new framework to study
More informationProposal of interference reduction routing for ad-hoc networks
Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,
More informationEnergy Aware Node Placement Algorithm for Wireless Sensor Network
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm
More informationDynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication
Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of
More informationOptimally-balanced Hash Tree Generation in Ad Hoc Networks
African Journal of Information and Communication Technology, Vol. 6, No., September Optimally-balanced Hash Tree Generation in Ad Hoc Networks V. R. Ghorpade, Y. V. Joshi and R. R. Manthalkar. Kolhapur
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationControl Frame Shaping in Power Controlled and Directional MAC Protocols
Ad Hoc & Sensor Wireless Networks Vol., pp. 1 26 Reprints available directly from the publisher Photocopying permitted by license only 27 Old City Publishing, Inc. Published by license under the OCP Science
More informationGROUP MANAGEMENT IN MOBILE ADHOC NETWORKS
American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064
More informationAn Energy-Balanced Cooperative MAC Protocol in MANETs
2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs
More informationSimulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More informationA CSP Search Algorithm with Reduced Branching Factor
A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il
More informationDynamic bandwidth management for multihop wireless ad hoc networks
Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr
More informationMobility-Sensitive Topology Control in Mobile Ad Hoc Networks
Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks Jie Wu and Fei Dai Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Department of Electrical
More information