The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Ad-hoc(75hit)

21-40hit(75hit)

  • A Framework for Goodput Optimization in P2P Streaming over Wireless Ad-Hoc Networks

    Hao YE  Kaiping XUE  Peilin HONG  Hancheng LU  

     
    PAPER-Network

      Vol:
    E94-B No:9
      Page(s):
    2511-2520

    Since the Content Distribution Network (CDN) and IP multicast have heavy infrastructure requirements, their deployment is quite restricted. In contrast, peer-to-peer (P2P) streaming applications are independent on infrastructures and thus have been widely deployed. Emerging wireless ad-hoc networks are poised to enable a variety of streaming applications. However, many potential problems, that are trivial in wired networks, will emerge when deploying existing P2P streaming applications directly into wireless ad-hoc networks. In this paper, we propose a goodput optimization framework for P2P streaming over wireless ad-hoc networks. A two-level buffer architecture is proposed to reassign the naive streaming systems' data requests. The framework adopts a chunk size-varying transmission algorithm to obtain smooth playback experience and acceptable overhead and utilize limited bandwidth resources efficiently. The distinguishing features of our implementation are as follows: first, the framework works as a middleware and is independent on the streaming service properties; existing P2P streaming application can be deployed in wireless ad-hoc networks with minimum modifications and development cost; second, the proposed algorithm can reduce unnecessary communication overheads compared with traditional algorithms which gain high playback continuity with small chunk size; finally, our scheme can utilize low bandwidth transmission paths rather than discarding them, and thus improve overall performance of the wireless network. We also present a set of experiments to show the effectiveness of the proposed mechanism.

  • A Self-Scheduling Multi-Channel Cognitive Radio MAC Protocol Based on Cooperative Communications

    Seyoun LIM  Tae-Jin LEE  

     
    PAPER-Network

      Vol:
    E94-B No:6
      Page(s):
    1657-1668

    As the demand for spectrum for future wireless communication services increases, cognitive radio technology has been developed for dynamic and opportunistic spectrum access, which enables the secondary users to use the underutilized licensed spectrum of the primary users. In particular, the recent studies on the MAC protocol for dynamic and opportunistic access have focused on sensing and using the vacant spectrum efficiently. Under the ad-hoc network environment, how the secondary users use the unused channels by the primary users affects the efficient utilization of channels and a cognitive radio system is required to follow the rapid and frequent changes in channel status. In this paper, we propose a self-scheduling multi-channel cognitive MAC (SMC-MAC) protocol, which allows multiple secondary users to transmit data though the sensed idle channels by two cooperative channel sensing algorithms, i.e., fixed channel sensing (FCS) and adaptive channel sensing (ACS), and by slotted contention mechanism to exchange channel request information for self-scheduling. The performance of the proposed SMC-MAC protocol is investigated via analysis and simulations. According to the results, the proposed SMC-MAC protocol is effective in allowing multiple secondary users to transmit data frames effectively on multi-channels and adaptively in response to the primary users' traffic dynamics.

  • Development of Multi Channel Ad-Hoc Network System

    Kentaro NISHIMORI  Takefumi HIRAGURI  Masakatsu OGAWA  Naoki HONMA  

     
    PAPER

      Vol:
    E94-B No:3
      Page(s):
    667-675

    This paper proposes a new Ad-Hoc network system which comprises the multiple relay access points (APs) with multi channels. Ad-Hoc network systems are recently proposed and incorporated for the communication infrastructure, which relays wireless transmission among access points (APs) in wireless LAN (WLAN) system. System throughput is decreased due to hidden terminal problem when only a single channel is used for the Ad-Hoc network. In order to solve this problem, a new system with multi channels is proposed. However, even if the multi channels are employed, the co- and/or adjacent-channel interference occurs due to hidden terminal problem and multiple APs in a limited space, when considering a simultaneous transmit and reception at the relay AP. In this paper, we develop an Ad-Hoc network testbed which can reduce and avoid co- and/or adjacent-channel interference by using vertically arranged antenna configuration and distributed channel allocation scheme. Moreover, the effectiveness of our testbed is clarified by applying actual WLAN signals.

  • MANET Multicast Model with Poisson Distribution and Its Performance for Network Coding

    Song XIAO  Ji LU  Ning CAI  

     
    LETTER-Network

      Vol:
    E94-B No:3
      Page(s):
    823-826

    Network Coding (NC) can improve the information transmission efficiency and throughput of data networks. Random Linear Network Coding (RLNC) is a special form of NC scheme that is easy to be implemented. However, quantifying the performance gain of RLNC over conventional Store and Forward (S/F)-based routing system, especially for wireless network, remains an important open issue. To solve this problem, in this paper, based on abstract layer network architecture, we build a dynamic random network model with Poisson distribution describing the nodes joining the network randomly for tree-based single-source multicast in MANET. We then examine its performance by applying conventional Store and Forward with FEC (S/F-FEC) and RLNC methods respectively, and derive the analytical function expressions of average packet loss rate, successful decoding ratio and throughput with respect to the link failure probability. An experiment shows that these expressions have relatively high precision in describing the performance of RLNC. It can be used to design the practical network coding algorithm for multi-hop multicast with tree-based topology in MANET and provide a research tool for the performance analysis of RLNC.

  • Performance Evaluation of Multi Hop Relay Network for Oceanic Air Traffic Control Communication

    Dac-Tu HO  Jingyu PARK  Shigeru SHIMAMOTO  Jun KITAORI  

     
    PAPER-Network

      Vol:
    E94-B No:1
      Page(s):
    86-96

    This paper proposes a new kind of communication system for air traffic control over the oceans; it is particularly effective at handling high air traffic loads due to many oceanic flights. In this system, each aircraft position report is sent to its relevant ground station by forwardly relaying them via a multi hop ad-hoc network that is formed by the aircraft between this aircraft and the ground station. In addition, an effective multiple access scheme with optimal values is also proposed. This scheme enables the various aircraft involved in relaying the signal to operate autonomously in a flight-route airspace. Furthermore, two useful schemes are proposed for efficient timeslot reuse and timeslot assignment in cases of low aircraft densities: the position aided timeslot reuse (PATR) and distance based timeslot assignment (DBTA), respectively. Finally, another scheme is proposed to improve the achievable relayed packet rate under low aircraft densities, which is called interference-based node selection (IB-NS). In all, the proposed system combined with those three schemes show the availability to utilize this system for air traffic control communications, specifically on high traffic ocean routes.

  • Rule-Based Ad-Hoc Workflow Modeling for Service Coordination: A Case Study of a Telecom Operational Support System

    Jae-Yoon JUNG  Joonsoo BAE  

     
    LETTER

      Vol:
    E93-A No:12
      Page(s):
    2740-2743

    Workflow technology has spread over the wide areas which require process control (e.g. logistics and e-business) or resource coordination (e.g. cooperative work and grid computing). Among various types of workflow, we introduce a case of ad-hoc workflow process in a Korean telecom company. Since such a service process is generally accompanied with customer's participation, the procedure and state are flexibly changed and sometimes capricious to cope with customer's request and operator's unexpected situation. In case of network service provisioning or problem shooting processes, customers often request the changes of their service types or visit appointments, which result in flexible and adaptive management of the process instances. In this paper, we present a novel approach to workflow modeling based on modified ECA rules (named P-ECA) for the purpose of ad-hoc workflow process modeling. The rule-based workflow modeling is comprehensible to engineers and can be implemented in programs at ease; therefore it is expected that it can be widely adopted for the ad-hoc and adaptive workflow modeling which requires dynamic changes of its states by internal or external events.

  • Congestion Awareness Multi-Hop Broadcasting for Safety Message Dissemination in VANET

    Songnan BAI  Jae-il JUNG  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3381-3390

    The safety applications for cooperative driving in VANETs, typically require the dissemination of safety-related information to all vehicles with high reliability and a strict timeline. However, due to the high vehicle mobility, dynamic traffic density, and a self-organized network, Safety message dissemination has a special challenge to efficiently use the limited network resources to satisfy its requirements. With this motivation, we propose a novel broadcasting protocol referred to as congestion awareness multi-hop broadcasting (CAMB) based loosely on a TDMA-like transmission scheduling scheme. The proposed protocol was evaluated using different traffic scenarios within both a realistic channel model and an 802.11p PHY/MAC model in our simulation. The simulation results showed that the performance of our CAMB protocol was better than those of the existing broadcasting protocols in terms of channel access delay, packet delivery ratio, end-to-end delay, and network overhead.

  • A Novel Emergency Rescue Urgent Communications for Sharing Evacuation Support Information in Panic-Type Disasters

    Tomotaka WADA  Akinori YAMANE  Kazuhiro OHTSUKI  Hiromi OKADA  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3429-3437

    Many people have suffered and died due to a lot of large-scale disasters such as earthquake, fire, and terrorism, etc. In disasters where most evacuators become panic, two things are necessary for their immediate evacuation. The first is to estimate the location of the disaster occurrence. The second is to construct an evacuation support system that searches for safe and efficient evacuation routes. In this paper, we propose Emergency Rescue Urgent Communication -- Evacuation Support System (EUC-ESS) based on Mobile Ad-hoc networks (MANET) composed of many mobile terminals. Using experiments and computer simulations, we show that this system would support evacuators in determining appropriate routes for survivors.

  • Adaptive 3-Dimensional Topology Control for Wireless Ad-Hoc Sensor Networks

    Junseok KIM  Jongho SHIN  Younggoo KWON  

     
    PAPER

      Vol:
    E93-B No:11
      Page(s):
    2901-2911

    Developing an adaptive 3-dimensional (3D) topology control algorithm is important because most wireless nodes are mobile and deployed in buildings. Moreover, in buildings, wireless link qualities and topologies change frequently due to various objects and the interference from other wireless devices. Previous topology control algorithms can suffer significant performance degradation because they only use the Euclidean distance for the topology construction. In this paper, we propose a novel adaptive 3D topology control algorithm for wireless ad-hoc sensor networks, especially in indoor environments. The proposed algorithm adjusts the minimum transmit power adaptively with considering the interference effect. To construct the local topology, each node divides the 3D space, a sphere centered at itself, into k equal cones by using Platonic solid (i.e., regular k-hedron) and selects the neighbor that requires the lowest transmit power in each cone. Since the minimum transmit power values depend on the effect of interferences, the proposed algorithm can adjust topology adaptively and preserve the network connectivity reliably. To evaluate the performance of algorithms, we conduct various experiments with simulator and real wireless platforms. The experimental results show that the proposed algorithm is superior to the previous algorithms in terms of the packet delivery ratio and the energy consumption with relatively low complexity.

  • Reliable Wireless Broadcast with Linear Network Coding for Multipoint-to-Multipoint Real-Time Communications

    Yoshihisa KONDO  Hiroyuki YOMO  Shinji YAMAGUCHI  Peter DAVIS  Ryu MIURA  Sadao OBANA  Seiichi SAMPEI  

     
    PAPER-Network

      Vol:
    E93-B No:9
      Page(s):
    2316-2325

    This paper proposes multipoint-to-multipoint (MPtoMP) real-time broadcast transmission using network coding for ad-hoc networks like video game networks. We aim to achieve highly reliable MPtoMP broadcasting using IEEE 802.11 media access control (MAC) that does not include a retransmission mechanism. When each node detects packets from the other nodes in a sequence, the correctly detected packets are network-encoded, and the encoded packet is broadcasted in the next sequence as a piggy-back for its native packet. To prevent increase of overhead in each packet due to piggy-back packet transmission, network coding vector for each node is exchanged between all nodes in the negotiation phase. Each user keeps using the same coding vector generated in the negotiation phase, and only coding information that represents which user signal is included in the network coding process is transmitted along with the piggy-back packet. Our simulation results show that the proposed method can provide higher reliability than other schemes using multi point relay (MPR) or redundant transmissions such as forward error correction (FEC). We also implement the proposed method in a wireless testbed, and show that the proposed method achieves high reliability in a real-world environment with a practical degree of complexity when installed on current wireless devices.

  • A Game Theoretic Power Control Algorithm with Sequential Subchannel Nulling for Wireless Networks

    Jae Cheol PARK  Yun Hee KIM  Een Kee HONG  Iickho SONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1649-1652

    Based on game theory, a distributed power control algorithm with sequential subchannel nulling is proposed for ad-hoc networks. It is shown that the proposed method, by sharing subchannels appropriately according to the interference profiles, can reduce the power consumption of the network while satisfying the target rate of each link.

  • Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks

    Sancheng PENG  Weijia JIA  Guojun WANG  Jie WU  Minyi GUO  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    510-517

    Due to the distributed nature, mobile ad-hoc networks (MANETs) are vulnerable to various attacks, resulting in distrusted communications. To achieve trusted communications, it is important to build trusted routes in routing algorithms in a self-organizing and decentralized fashion. This paper proposes a trusted routing to locate and to preserve trusted routes in MANETs. Instead of using a hard security mechanism, we employ a new dynamic trust mechanism based on multiple constraints and collaborative filtering. The dynamic trust mechanism can effectively evaluate the trust and obtain the precise trust value among nodes, and can also be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present a trusted routing protocol, based on dynamic trust mechanism, by extending DSR, in which a node makes a routing decision based on the trust values on its neighboring nodes, and finally, establish a trusted route through the trust values of the nodes along the route in MANETs. The effectiveness of our approach is validated through extensive simulations.

  • A High Throughput On-Demand Routing Protocol for Multirate Ad Hoc Wireless Networks

    Md. Mustafizur RAHMAN  Choong Seon HONG  Sungwon LEE  

     
    PAPER-Network

      Vol:
    E93-B No:1
      Page(s):
    29-39

    Routing in wireless ad hoc networks is a challenging issue because it dynamically controls the network topology and determines the network performance. Most of the available protocols are based on single-rate radio networks and they use hop-count as the routing metric. There have been some efforts for multirate radios as well that use transmission-time of a packet as the routing metric. However, neither the hop-count nor the transmission-time may be a sufficient criterion for discovering a high-throughput path in a multirate wireless ad hoc network. Hop-count based routing metrics usually select a low-rate bound path whereas the transmission-time based metrics may select a path with a comparatively large number of hops. The trade-off between transmission time and effective transmission range of a data rate can be another key criterion for finding a high-throughput path in such environments. In this paper, we introduce a novel routing metric based on the efficiency of a data rate that balances the required time and covering distance by a transmission and results in increased throughput. Using the new metric, we propose an on-demand routing protocol for multirate wireless environment, dubbed MR-AODV, to discover high-throughput paths in the network. A key feature of MR-AODV is that it controls the data rate in transmitting both the data and control packets. Rate control during the route discovery phase minimizes the route request (RREQ) avalanche. We use simulations to evaluate the performance of the proposed MR-AODV protocol and results reveal significant improvements in end-to-end throughput and minimization of routing overhead.

  • Distributed Stable Flooding Using Delay Function Based on Redundancy

    Wonjong NOH  

     
    LETTER-Network

      Vol:
    E92-B No:12
      Page(s):
    3923-3926

    In this work, we propose a delayed data forwarding scheme using delay function. According to the link status and network topology, each node gives arrived packets some delay before forwarding them so that the packet flows through the most stable route. We first propose conservative delay function from strict end-to-end delay bound and then relax it more and more and finally introduce a SNR based delay function using cross-layer concept between link layer and network layer. We show its performance by some analysis and simulation in mesh networks. This scheme is useful for stable data routing in highly dynamic networks.

  • A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks

    Sergio CARRILHO  Hiroshi ESAKI  

     
    PAPER-Network Architecture and Testbed

      Vol:
    E92-D No:10
      Page(s):
    1888-1896

    Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.

  • Bidirectional Packet Aggregation and Coding for Efficient VoIP Transmission in Wireless Multi-Hop Networks

    Jun HASEGAWA  Hiroyuki YOMO  Yoshihisa KONDO  Peter DAVIS  Katsumi SAKAKIBARA  Ryu MIURA  Sadao OBANA  

     
    PAPER

      Vol:
    E92-B No:10
      Page(s):
    3060-3070

    This paper proposes bidirectional packet aggregation and coding (BiPAC), a packet mixing technique which jointly applies packet aggregation and network coding in order to increase the number of supportable VoIP sessions in wireless multi-hop mesh networks. BiPAC applies network coding for aggregated VoIP packets by exploiting bidirectional nature of VoIP sessions, and largely reduces the required protocol overhead for transmitting short VoIP packets. We design BiPAC and related protocols so that the operations of aggregation and coding are well-integrated while satisfying the required quality of service by VoIP transmission, such as delay and packet loss rate. Our computer simulation results show that BiPAC can increase the number of supportable VoIP sessions maximum by around 87% as compared with the case when the packet aggregation alone is used, and 600% in comparison to the transmission without aggregation/coding. We also implement BiPAC in a wireless testbed, and run experiments in an actual indoor environment. Our experimental results show that BiPAC is a practical and efficient forwarding method, which can be implemented into the current mesh hardware and network stack.

  • Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks

    Yun GE  Guojun WANG  Qing ZHANG  Minyi GUO  

     
    PAPER-Networks

      Vol:
    E92-D No:9
      Page(s):
    1675-1682

    We propose a Multiple Zones-based (M-Zone) routing protocol to discover node-disjoint multiplath routing efficiently and effectively in large-scale MANETs. Compared with single path routing, multipath routing can improve robustness, load balancing and throughput of a network. However, it is very difficult to achieve node-disjoint multipath routing in large-scale MANETs. To ensure finding node-disjoint multiple paths, the M-Zone protocol divides the region between a source and a destination into multiple zones based on geographical location and each path is mapped to a distinct zone. Performance analysis shows that M-Zone has good stability, and the control complexity and storage complexity of M-Zone are lower than those of the well-known AODVM protocol. Simulation studies show that the average end-to-end delay of M-Zone is lower than that of AODVM and the routing overhead of M-Zone is less than that of AODVM.

  • Optimal Opportunistic Scheduling and Adaptive Modulation Policies in Wireless Ad-Hoc Networks with Network Coding

    Seong-Lyong GONG  Byung-Gook KIM  Jang-Won LEE  

     
    LETTER-Network

      Vol:
    E92-B No:9
      Page(s):
    2954-2957

    In this paper, we study an opportunistic scheduling and adaptive modulation scheme for a wireless network with an XOR network coding scheme, which results in a cross-layer problem for MAC and physical layers. A similar problem was studied in [2] which considered an idealized system with the Shannon capacity. They showed that it may not be optimal for a relay node to encode all possible native packets and there exists the optimal subset of native packets that depends on the channel condition at the receiver node of each native packet. In this paper, we consider a more realistic model than that of [2] with a practical modulation scheme such as M-PSK. We show that the optimal policy is to encode native as many native packets as possible in the network coding group into a coded packet regardless of the channel condition at the receiver node for each native packet, which is a different conclusion from that of [2]. However, we show that adaptive modulation, in which the constellation size of a coded packet is adjusted based on the channel condition of each receiver node, provides a higher throughput than fixed modulation, in which its constellation size is always fixed regardless of the channel condition at each receiver node.

  • Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppression and Loop Correction

    Lee SPEAKMAN  Yasunori OWADA  Kenichi MASE  

     
    PAPER-Network

      Vol:
    E92-B No:4
      Page(s):
    1210-1221

    Transient routing loops have been observed to form in Mobile Ad-hoc Networks running the OLSRv2 proactive link-state routing protocol. The packets falling into loops impact the surrounding network thus degrading throughput even though only a small proportion of the traffic may enter these loops and only for a short time. This becomes significantly more evident when Link Layer Notification is used to catch broken links, inadvertently leading to an increase in the number of loops. Two methods of Loop Detection are introduced and are used to trigger either Loop Suppression by selectively and preemptively discarding the looping packets that are unlikely to reach their destination, or Loop Correction by the notification of the routing protocol to cut the link over which the packet is looping. The newly introduced Loop Suppression and Loop Correction techniques used with Link Layer Notification are shown to significantly increase network performance over plain OLSRv2 and OLSRv2 with Link Layer Notification.

  • Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    Mikyung KANG  Dong-In KANG  Jinwoo SUH  

     
    PAPER

      Vol:
    E92-B No:3
      Page(s):
    737-744

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11 Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5 Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

21-40hit(75hit)