CALCULATION OF INFERENCE IN AD-HOC NETWORK

Similar documents
Interference in Wireless Multi-hop Ad-hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

ONE can increase the spatial reuse in a cellular data network

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

Interference power statistics in ad-hoc and sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Analysis of Random Data Hopping in Distributed Multihop Wireless Networks

Distributed STDMA in Ad Hoc Networks

The Capacity of Wireless Networks

CSMA based Medium Access Control for Wireless Sensor Network

2 Related Work. 1 Introduction. 3 Background

PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING APPROACH

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks

Onroad Vehicular Broadcast

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Rumor Routing Algorithm

Comp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am

MultiHop Routing for Delay Minimization in WSN

Performance Evaluation of MANET through NS2 Simulation

ECE 4450:427/527 - Computer Networks Spring 2017

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Wireless Network Capacity. Nitin Vaidya

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Routing in Variable Topology Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

Capacity Regions for Wireless Ad Hoc Networks

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Heuristic Clustering Algorithms in Ad hoc Networks

OPTIMIZATION ALGORITHMS FOR INFORMATION RETRIEVAL AND TRANSMISSION IN DISTRIBUTED AD HOC NETWORKS. A Dissertation HONG LU

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

RESEARCH ON INTER-SATELLITE COMMUNICATION SYSTEM OF FRACTIONATED SPACECRAFT

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

ECE 158A - Data Networks

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

Reliable Routing In VANET Using Cross Layer Approach

Network Connectivity Analysis of VANET using Fuzzy Logic Controller

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

Mobile-Gateway Routing for Vehicular Networks 1

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

The MAC Protocol of the paper: Performance of Buffer-Aided Adaptive Modulation in Multihop Communications

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013

ITRAINONLINE MMTK BASIC WIRELESS INFRASTRUCTURE AND TOPOLOGIES HANDOUT

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Last Lecture: Data Link Layer

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL

Performance Evaluation of UMTS-WLAN interworking Anita Nanda 1, S.P.Panigrahi 2, R.R.Mohanty 2, N.Panda 2, M.Singh 2, S.M.Rout 2

15-441: Computer Networking. Wireless Networking

Admission Control in Time-Slotted Multihop Mobile Networks

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Principles of Wireless Sensor Networks

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

MEGHADOOT: A PACKET RADIO NETWORK ARCHITECTURE FOR RURAL COMMUNITIES

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Generalized Coordinates for Cellular Automata Grids

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

Worst-case Ethernet Network Latency for Shaped Sources

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Figure.2. Hidden & Exposed node problem

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

Delay-Throughput Tradeoff for Supportive Two-Tier Networks

Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System. Results & Scenarios. by Pietro Lungaro

Aerial Platform Placement Algorithm to Satisfy Connectivity and Capacity Constraints in Wireless Ad-hoc Networks

WIRELESS relays are commonly used to extend the coverage

Layer 2 functionality bridging and switching

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Location Awareness in Ad Hoc Wireless Mobile Neworks

Announcements. CMPE 257: Wireless and Mobile Networking. Today. Location Management. Project status update 2. Graded exams. Hw 4 (?) Project report.

Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios

QoS Based Evaluation of Multipath Routing Protocols in Manets

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

Part I. Wireless Communication

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

Transcription:

CALCULATION OF INFERENCE IN AD-HOC NETWORK POOJA GROVER, 2 NEHA GUPTA, 3 RANJIT KUMAR Asst. Prof., Department of Computer Science & Engineering, MDU, Rohtak, India-3300 2 Lecturer, Department of Information Technology, MDU, Rohtak, India-3300 3 Asst. Prof., Department of Computer Science & Engineering,, MDU, Rohtak, India-3300 ABSTRACT In this paper we propose a new model to calculate inference levels in wireless multi-hop ad-hoc networks. This model computes the expected value of carrier to inference ratio(c/i) by taking into account the number of nodes, density of nodes, radio propagation aspects, multihop characteristics of the network and amount of relay traffic. For the performance evaluation and determination of the capacity in any wireless network, it is important to have good calculation model to estimate interference power statics to our best knowledge till now there has been no accurate calculation model to estimate the expected interference power and its distribution function in adhoc network and sensor networks with realistic assumptions regarding radio propagation. To find a mathematical formula for expected interference in adhoc networks, we have simplified the reality of adhoc networks in three aspects:. We have used the path loss radio propagation model, 2. We have chosen for a specific arrangement of nodes on a two dimensional hexagonal lattice resembling a honey grid(which explains the name given to our model: the honey grid model), 3. We have simplified the rules of the MAC protocol. Keywords: Wireless Communication, Path Loss Exponent,MAC Protocol, Lognormal Summation Method. INTRODUCTION Ad-hoc Network: Ad-hoc networks are formed in situations where mobile computing devices, require networking applications where a fixed network infrastructure is not available or not preferred to be used. In these cases mobile devices could set up a possibly short-lived network for the communication needs of the moment, in other words, an ad-hoc network. Ad-hoc networks are decentralized; selforganizing networks and is capable of forming a communication network without referring on any fixed infrastructure. Like any other wireless communication system. Ad-hoc networks are restricted in their capabilities by radio technology limitations on data transmission speed and range. II. WIRELESS AD-HOC NETWORK VS TRADITIONAL WIRELESS CELLULAR NETWORKS. Wireless multi-hop ad-hoc networks are formed by a group of mobile users or mobile devices spread over a certain geographical area. We call the users or devices forming the network Nodes. The Service Area of the Ad-hoc network is the whole geographical area where nodes are distributed. Each node is equipped with a radio transmitter and receiver which allows it to communicate with the other nodes. As mobile Ad-hoc networks are self-organized networks. Communication in Ad-hoc networks does not require a central base station. Each node of an Ad-hoc Network can generate data for any other node in the network. All nodes can function, if needed, as relay stations for data packets to be routed in their final destination. 05

A mobile Ad-hoc network may be connected through dedicated gateways, or nodes functioning as gateways, to other fixed networks or the Internet. In this case, the mobile Ad-hoc network expands the access to fixed network service. To complete the description of our assumptions in this model, we add that it is assumed that all nodes transmit with the same power, all nodes have the same traffic generation behavior and all data has the same priority. Although single-hop ad-hoc networks are often used in practice. For example, a laptop communicating with devices like PDA, a memory storage devices and a video camera by using blue tooth forms a single-hop ad-hoc networks. Here when we refer to ad-hoc networks, we always mean multihop ad-hoc networks. The multi-hop support in ad-hoc networks, which makes communication between nodes out of direct radio range of each other possible, is probably the most distinct difference between mobile ad-hoc networks and other wireless communication systems. III. MODEL DESCRIPTION For simplicity of mathematical derivations, our interference calculations in this model will be based on the pathloss power law model for radio propagation. With the power law model for radio propagation, and the assumption that transmission power and receiver sensitivity for all nodes is same, the coverage area of any node is a circle with radius R.A node can have direct communication with all nodes that fall inside its coverage area. Fig 2: The honey-grid model showing all nodes. When nodes are placed on a honey-grid, from the point of a node in the center of the configuration other nodes are positioned on co-centered hexagons (see fig 2), we call each of these hexagons a ring. The first hexagonal ring has size and contains 6 nodes. The i th hexagonal ring has a side of size i and contains 6i nodes. The size of the network can be expressed in terms of k co-centered hexagonal rings around node 0,or by N the total number of nodes in this configuration. N and k are linked through the formulas: Fig: Constellation of interfering nodes around node 0 when we arrange interfering nodes in position to obtain the maximum number of inferences. N=+ 6 j =+3k(k+) Where k= / 4 + ( n ) / 3 - ½ k In figure 2 we have depicted by a circle the coverage area for node 0 in the center of the configuration. in this example we have chosen the coverage area so that it includes two hexagonal rings. The coverage area could be larger and include more rings. This happens when the network density increases.however, the radius of the coverage area cannot be less than, otherwise the network is not connected. The number of nodes inside the coverage area of each node (its degree) is indicated by d. We assume 06

that an entire ring is either included or excluded from the coverage area. We define a node s reach as the number of hexagonal rings that fall inside the coverage area of that node. We indicate the reach of a node by symbol a (for example, a=2 in fig 2). The degree of a node that is not at the borders of the service area is: a d= 6 j = 3a (a+) Each node may communicate directly with all nodes inside its coverage area. For reaching other destinations multi-hopping must be used. There are basically two ways for reaching each destinations: If node 0 in figure 2 wishes to communicate with a node positioned on ring 3(the third ring seen from the enter),it either can hop through a node on ring and then a node on ring 2;or it can skip ring and hop directly to a node on ring 2 before reaching the destination. The first method preserves the energy while the second method keeps the number of hops minimum. We will show that our model can work with both routing methods. If we consider minimum hop routing, certain intermediate rings on the way from the source to the destination can be skipped. figure 3 shows in tick lines the subset of the rings that can be used for multi-hop to any destination. We will call these rings relay rings. When packets are routing throughout the network, there may be multiple paths to the same destination. For example, the source (node 0) and the destination (node 3) shown in fig 3 may be connected by the path going through nodes0--3 or path going through nodes 0-2-3. In our calculation of interference it is important to know the amount of relay traffic caused by multiple hops from source to destination, but the exact path from the source to destination is not relevant. Therefore, for us both these paths are the same, as they both consist of two hops. In figure 3 where a=2, we see that the first relay ring has a side of size 2 and contains 6 relay nodes. Relay nodes are those nodes on each relay ring that need to be used to reach any arbitrary destination (for example, when nodes and 4 are relay nodes, node 2 is not chosen as a relay node because all destinations that could be reached through node 2 are already reachable through either node or node 4) generally, if a is the reach of node 0,the number of co-centered relay rings seen from node 0 is, k / a where the sign x indicates routing down to the nearest integer. Fig 3: Relay rings and relay nodes in a Honeygrid. Thick lines shows relay rings. Dark filled circles are relay nodes...hollow circles are other nodes in the network. The number of relay nodes (source node included) is then: k a k k N r =+ 6 j =+3 + a a We mentioned earlier in this section that our model could handle energy efficient routing as well as minimum hop routing. If parameter a=, regardless of the reach of mobile nodes, the hopcount, traffic estimation and interference power as found here will be for energy efficient routing. If parameter a is chosen equal to the maximum radio reach of mobile nodes, the hopcount, traffic estimation and interference are found for minimum hop routing. IV. INTERFERENCE CALCULATION WITH HONEY-GRID MODEL According to the Honey-grid model, each node has d other nodes inside its coverage area (except for nodes at the borders of the network). As explained in Model Description (sec III ), around node 0 the first set of interfering signals will come from signals that are transmitted from nodes just outside the coverage area of node 0.Recalling our assumption that an entire ring is either included or excluded from the coverage area, the first ring of interference consists of 6 nodes positioned at distance (a+) to node 0.Generally, if a is the reach of node 0,the 07

number of co-centered interference rings seen from node 0 is k /( a +),and the number of interfering node is: k a+ k k N i = 6 j = 3 + a a.9.4 calculations, we use a simplification: we assume that the distance between all interfering nodes on each ring to node 0 is equal to the distance of the corner nodes to node 0.This is not an accurateapproximation, especially when the service area is large. Following table shows calculation steps for finding interference power originated from the j th interfering ring: Sequence number of interfering ring Number of interfering nodes on the ring Approximated distance of each interfering node to the center node Interference power coming from each interfering node on the ring Interference power coming from all interfering nodes on the ring Normalized interference power coming from all interfering nodes on the ring j 6j j(a+) c( j(a+) /r 0 ) -η 6jqc(j(a+) /r 0 ) -η 6q( +/a) -η j -η Fig 4:Honey-grid with interfering rings (thick lines) for a= Figure 4 shows the interfering rings and the interfering nodes observed from the position of the center node in a honey grid model with a=. Nodes in the center of the configuration have the highest number of potential interfering nodes around them in all directions. Therefore; we choose the amount of interference experienced at node 0 as representative for the maximum level of interference inside the network. In the remainder of this section, a closed-form expression for interference at node 0 is found. If the level of interference is acceptable at node 0, we can assume that it is also acceptable for other nodes. To calculate the amount of interference experienced at node 0, we add the interference power received at node 0 from all interfering nodes. The first interference ring contains 6 nodes at distance (a+).the second interference ring contains 2 interfering nodes from which 6 nodes in the corners of the hexagonal ring are at the distance 2(a+) to node 0 and 6 other nodes are at the distance 3 (a+) to node 0. The distance of the nodes on each ring to node 0 can be calculated exactly. However, in our The j th interfering ring contains 6j nodes at approximated distance j (a+) to node 0. Let q be the probability of transmission (transmission of own signals or relay signals) per node in a given time slot. Using area mean power law that states: P a = c (r/r 0 ) -η (The averaged power at any given distance to the transmitter is referred to as area mean power P a (in watt or milliwatt). The path loss model states that Pa is decreasing function of the distance r between the transmitter and the receiver, and can be represented by a power law. The r 0 is the reference distance, parameter is the path loss exponent which depends on the environment and terrain structure and can vary between 2 in free space to 6 in heavily built urban areas. In indoor environment with line-of-sight condition, pathloss exponent values of about.6 to.8. The constant c depends on the transmitted power, the receiver and the transmitter antenna gains and the wavelength.) Using this formuls, the mean power of interfering signals originating from ring j is 6jqc(j(a+) /r 0 ) -η To eliminate the parameters not relevant to our study, we normalize variables as follows. We can define R as the distance where the area mean power P a (r ij ) is equal to ρ, the receiver sensitivity. in other words, we normalize this interference power to the power: ρ = c (R/r 0) -η 08

Where R=a is radius of the coverage area of a node. The normalized interference power coming from ring j is then: 6q( +/a) -η j -η The total amount of normalized inference mean power is then: I=6q(+/a) -η K A+ J = j -η 9.5 k When network size increases a + and the above formula can be written as: I, =6q( +a - ) η ζ(η-) 8 Where, for Re(s) >, ζ(s) = j -s is the Riemann-Zeta Function. If the path loss exponent η 2, the interference power tends to explode when the network size increases. Fig: comparison of interference upper bound with inference calculated using the lognormal summation method. In this plot we have assumed ξ=0(pathloss model) To make a loose analogy, we all see that the sky at night is dark despite the virtually infinite number of stars contributing to its brightness. REFERENCES [.] Ad-hoc networks: Fundamental properties and network Topologies. Springer Publication. [2.] IETF Mobile Ad-hoc Networks(MANET) Working group site http://www.ietf.org/html.chapters/manetchapter.html [3.] Optimized Link State Routing Protocol, IETF-d Working Group,Sepetember 200. [4.] Learning internal representations by error propagation by Rumelhart, Hinton and Williams (2003). [5.] Arunkumar Thangavelu, Sivanandam S.N(February 2007A). Location identification and Vehicular Tracking for Vehicular Ad-hoc wireless Networks IEEE Explorer (2): 2-6 When path loss exponent η > 2, ζ (η-) is a converging series with positive terms and is upper-bounded by: 8 8 j -η + ( / x η- ) dx = η-/ η-2 Based on the above formula we can conclude that the amount of interference power in a mobile ad-hoc network is upper-bounded by the following expression: I 6q(+a - ) η V. CONCLUSION η-/ η-2, η>2. This conclusion is an important result and may see contra-intuitive at the first glance. Intuitively, one may believe that adding interference power from an infinite number of interference sources, regardless of how small the interference values, may lead to an infinite sum. Above we have shown that this is not the case when radio signals decay sufficiently fast over traveled distances. 09

PAGE INTENTIONALLY LEFT BLANK! 0