The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] HOC(320hit)

81-100hit(320hit)

  • Distributed Channel Selection in CRAHNs with Heterogeneous Spectrum Opportunities: A Local Congestion Game Approach

    Yuhua XU  Qihui WU  Jinlong WANG  Neng MIN  Alagan ANPALAGAN  

     
    LETTER-Network

      Vol:
    E95-B No:3
      Page(s):
    991-994

    This letter investigates the problem of distributed channel selection in cognitive radio ad hoc networks (CRAHNs) with heterogeneous spectrum opportunities. Firstly, we formulate this problem as a local congestion game, which is proved to be an exact potential game. Then, we propose a spatial best response dynamic (SBRD) to rapidly achieve Nash equilibrium via local information exchange. Moreover, the potential function of the game reflects the network collision level and can be used to achieve higher throughput.

  • Outage Probability Analysis of 3G/Ad Hoc Cooperative Network

    Xujie LI  Weiwei XIA  Qiong YANG  Lianfeng SHEN  

     
    LETTER-Network

      Vol:
    E95-B No:3
      Page(s):
    999-1002

    This letter presents an analytical study of outage probability of a 3G/Ad Hoc cooperative network. The considered cooperative network can improve the signal quality so as to decrease the outage probability. Meanwhile, it imposes additional interference on other ongoing users. But on the whole, our analytical study and simulation results show that the cooperative network can still effectively overcome outage event and decrease the average outage probability.

  • VANET Broadcast Protocol Based on Fuzzy Logic and Lightweight Retransmission Mechanism

    Celimuge WU  Satoshi OHZAHATA  Toshihiko KATO  

     
    PAPER-Network

      Vol:
    E95-B No:2
      Page(s):
    415-425

    Vehicular ad hoc networks have been attracting the interest of both academic and industrial communities on account of their potential role in Intelligent Transportation Systems (ITS). However, due to vehicle movement and fading in wireless communications, providing a reliable and efficient multi-hop broadcast service in vehicular ad hoc networks is still an open research topic. In this paper, we propose FUZZBR (FUZZy BRoadcast), a fuzzy logic based multi-hop broadcast protocol for information dissemination in vehicular ad hoc networks. FUZZBR has low message overhead since it uses only a subset of neighbor nodes to relay data messages. In the relay node selection, FUZZBR jointly considers multiple metrics of inter-vehicle distance, node mobility and signal strength by employing the fuzzy logic. FUZZBR also uses a lightweight retransmission mechanism to retransmit a packet when a relay fails. We use computer simulations to evaluate the performance of FUZZBR.

  • Two Phase Admission Control for QoS Mobile Ad Hoc Networks

    Chien-Sheng CHEN  Yi-Wen SU  Wen-Hsiung LIU  Ching-Lung CHI  

     
    PAPER

      Vol:
    E95-D No:2
      Page(s):
    442-450

    In this paper a novel and effective two phase admission control (TPAC) for QoS mobile ad hoc networks is proposed that satisfies the real-time traffic requirements in mobile ad hoc networks. With a limited amount of extra overhead, TPAC can avoid network congestions by a simple and precise admission control which blocks most of the overloading flow-requests in the route discovery process. When compared with previous QoS routing schemes such as QoS-aware routing protocol and CACP protocols, it is shown from system simulations that the proposed scheme can increase the system throughput and reduce both the dropping rate and the end-to-end delay. Therefore, TPAC is surely an effective QoS-guarantee protocol to provide for real-time traffic.

  • Concurrent Transmission Based on Channel Quality in Ad Hoc Networks: A Game Theoretic Approach

    Chen CHEN  Xinbo GAO  Xiaoji LI  Qingqi PEI  

     
    PAPER

      Vol:
    E95-D No:2
      Page(s):
    462-471

    In this paper, a decentralized concurrent transmission strategy in shared channel in Ad Hoc networks is proposed based on game theory. Firstly, a static concurrent transmissions game is used to determine the candidates for transmitting by channel quality threshold and to maximize the overall throughput with consideration of channel quality variation. To achieve NES (Nash Equilibrium Solution), the selfish behaviors of node to attempt to improve the channel gain unilaterally are evaluated. Therefore, this game allows each node to be distributed and to decide whether to transmit concurrently with others or not depending on NES. Secondly, as there are always some nodes with lower channel gain than NES, which are defined as hunger nodes in this paper, a hunger suppression scheme is proposed by adjusting the price function with interferences reservation and forward relay, to fairly give hunger nodes transmission opportunities. Finally, inspired by stock trading, a dynamic concurrent transmission threshold determination scheme is implemented to make the static game practical. Numerical results show that the proposed scheme is feasible to increase concurrent transmission opportunities for active nodes, and at the same time, the number of hunger nodes is greatly reduced with the least increase of threshold by interferences reservation. Also, the good performance on network goodput of the proposed model can be seen from the results.

  • Recipients' Anonymity in Multihop Ad-Hoc Networks

    Helena RIFA-POUS  Emmanouil A. PANAOUSIS  Christos POLITIS  

     
    LETTER-Privacy

      Vol:
    E95-D No:1
      Page(s):
    181-184

    Multihop ad-hoc networks have a dynamic topology. Retrieving a route towards a remote peer requires the execution of a recipient lookup, which can publicly reveal sensitive information about him. Within this context, we propose an efficient, practical and scalable solution to guarantee the anonymity of recipients' nodes in ad-hoc networks.

  • Passive Coding-Based Epidemic Routing in Sparsely Populated Mobile Ad hoc Networks

    Yasushi YAMAWAKI  Takahiro MATSUDA  Tetsuya TAKINE  

     
    PAPER-Network

      Vol:
    E95-B No:1
      Page(s):
    169-177

    Epidemic Routing is a data delivery scheme based on the store-carry-forward routing paradigm for sparsely populated mobile ad hoc networks. In Epidemic Routing, each node copies packets in its buffer into any other node that comes within its communication range. Although Epidemic Routing has short delay performance, it causes excessive buffer space utilization at nodes because many packet copies are disseminated over the network. In this paper, aiming at efficient buffer usage, we propose an XOR-based delivery scheme for Epidemic Routing, where nodes encode packets by XORing them when their buffers are full. Note that existing delivery schemes with coding are active coding, where source nodes always encode packets before transmitting them. On the other hand, the proposed scheme is passive coding, where source nodes encode packets only when buffer overflow would occur. Therefore, the behavior of the proposed scheme depends on the buffer utilization. More specifically, if sufficient buffer space is available, the proposed scheme delivers packets by the same operation as Epidemic Routing. Otherwise, it avoids buffer overflow by encoding packets. Simulation experiments show that the proposed scheme improves the packet delivery ratio.

  • Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks Open Access

    Feng LI  Jie WU  Avinash SRINIVASAN  

     
    INVITED PAPER

      Vol:
    E95-D No:1
      Page(s):
    12-19

    Link and node trustworthiness are important metrics in wireless ad hoc networks. Many existing wireless ad hoc network routing algorithms assume the availability of precise trustworthiness information. This, however, is an unrealistic assumption given the dynamics of wireless ad hoc networks. Therefore, a realistic method is needed to evaluate trustworthiness by mitigating uncertainty in the estimation process. In this paper, we propose a novel trustworthiness estimation model that accounts for uncertainty as well as two uncertainty mitigation schemes. We then illustrate the effectiveness of our schemes using a utility-oriented routing algorithm as a sample application. An extensive simulation study shows that these two uncertainty mitigation schemes significantly increase path stability and the long-term total benefit of the wireless ad hoc network.

  • Jamming-Aware Routing in Ad Hoc Networks

    Jae-Joon LEE  Jihye LEE  Jaesung LIM  

     
    LETTER-Network

      Vol:
    E95-B No:1
      Page(s):
    293-295

    When a jamming attack occurs, existing ad hoc routing protocols can experience significant throughput degradation and unnecessary control overhead due to the inclusion of unreliable links into routing paths. In this work, we identify which factors hinder establishment of reliable routing paths by the existing routing protocols in the face of jamming attacks. Our solution is Jamming-Aware Routing (JAR) based on OLSR protocol, which provides explicit route recovery procedures to counteract jamming attack. By establishing a reliable routing path, the proposed scheme achieves significant throughput gains as well as control overhead reduction.

  • FSRS Routing Method for Energy Efficiency through the New Concept of Flooding Restriction in Wireless Ad-Hoc Networks

    Jangsu LEE  Sungchun KIM  

     
    PAPER-Network

      Vol:
    E94-B No:11
      Page(s):
    3037-3048

    In MANET (Mobile Ad-hoc NETworks), there are two kinds of routing methods: proactive and reactive. Each has different characteristics and advantages. The latter generally employs the flooding technique to finding a routing path to the destination. However, flooding has big overheads caused by broadcasting RREQ packets to the entire network. Therefore, reducing this overhead is really needed to enable several network efficiencies. Previous studies introduced many approaches which are mainly concerned with the restriction of flooding. However, they usually configure the detailed routing path in the forward flooding procedure and ignore the factors causing the flooding overheads. In this paper, we propose the FSRS (First Search and Reverse Setting) routing protocol which is a new approach in flooding techniques and a new paradigm shift. FSRS is based on cluster topology and is composed of two main mechanisms: inter-cluster and intra-cluster flooding. Inter-cluster routing floods RREQ packets between cluster units and sets a cluster path. When the destination node receives the RREQ packet, it floods RREP packets to an intra-cluster destination which is a gateway to relay the RREP packet to a previous cluster. This is called intra-cluster routing. So to speak, a specific routing path configuration progresses in the RREP process through the reverse cluster path. Consequently, FSRS is a new kind of hybrid protocol well adapted to wireless ad-hoc networks. This suggests a basic wireless networking architecture to make a dynamic cluster topology in future work. In the simulation using NS-2, we compare it to several other protocols and verify that FSRS is a powerful protocol. In the result of the simulation, FSRS conserves energy by a maximum of 12% compared to HCR.

  • Fast and Simple 2D Shape Retrieval Using Discrete Shock Graph

    Solima KHANAM  Seok-Woo JANG  Woojin PAIK  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E94-D No:10
      Page(s):
    2059-2062

    In this letter, we propose an effective method to retrieve images from a 2D shape image database using discrete shock graphs combined with an adaptive selection algorithm. Experimental results show that our method is more accurate and fast than conventional approaches and reduces computational complexity.

  • Performance of Handovers between NEMO and Mobile Ad Hoc Networks Using Buffering

    Jirawat THAENTHONG  Steven GORDON  

     
    PAPER-Network

      Vol:
    E94-B No:10
      Page(s):
    2763-2775

    A MANEMO node is an IP-based mobile node that has interface attachments to both a mobile network, using Network Mobility (NEMO), and a Mobile Ad Hoc Network (MANET). While communicating with a correspondent node in the Internet, the MANEMO node should use the best possible path. Therefore, as conditions change, a handover between NEMO and MANET is desirable. This paper describes the operation of a MANEMO handover when IEEE 802.11 is used. An analytical model illustrates that packet loss during a MANEMO handover may severely affect data and real-time applications. We therefore propose using buffering during the handover, by making use of the Power Save Mode in IEEE 802.11. In the proposed algorithm, a MANEMO node may rapidly switch between the two interfaces, eventually receiving packets delivered via the old network interface while initiating the Mobile IP/NEMO handover on the new interface. Performance results show that packet loss can be significantly reduced, with small and acceptable increases in signalling overhead and end-to-end delay.

  • Dynamic Multipoint Relay Candidate Selection for Broadcast Data Aggregation in Mobile Ad-Hoc Networks

    Hyung-Weon CHO  Jong-Moon CHUNG  Myunghwan SEO  Jongho PARK  Jihyoung AHN  Bumkwi CHOI  Tae-Jin LEE  

     
    LETTER-Network

      Vol:
    E94-B No:9
      Page(s):
    2629-2633

    In OLSR, only selected multipoint relays (MPRs) are allowed to forward broadcast data during the flooding process, which reduces the message propagation overhead compared to the classical flooding mechanism. Since every node in a network selects its own MPRs independently, many nodes may be MPRs of other nodes, which results in many collisions in the medium access control (MAC) layer under heavy traffic conditions. In this paper, we propose an MPR candidate selection mechanism for broadcast data aggregation in mobile ad-hoc networks. The proposed MPR candidate selection scheme can reduce the number of MPR candidates and appropriately spread MPR candidates over the whole network area. The performance of the proposed MPR candidate selection mechanism is investigated via mathematical analysis and simulations. We also propose a broadcast data aggregation mechanism to achive efficient resource utilization. Performance evaluation indicates that the proposed MPR candidate selection and broadcast data aggregation mechanism is efficient under heavy broadcast traffic load conditions.

  • A Framework for Goodput Optimization in P2P Streaming over Wireless Ad-Hoc Networks

    Hao YE  Kaiping XUE  Peilin HONG  Hancheng LU  

     
    PAPER-Network

      Vol:
    E94-B No:9
      Page(s):
    2511-2520

    Since the Content Distribution Network (CDN) and IP multicast have heavy infrastructure requirements, their deployment is quite restricted. In contrast, peer-to-peer (P2P) streaming applications are independent on infrastructures and thus have been widely deployed. Emerging wireless ad-hoc networks are poised to enable a variety of streaming applications. However, many potential problems, that are trivial in wired networks, will emerge when deploying existing P2P streaming applications directly into wireless ad-hoc networks. In this paper, we propose a goodput optimization framework for P2P streaming over wireless ad-hoc networks. A two-level buffer architecture is proposed to reassign the naive streaming systems' data requests. The framework adopts a chunk size-varying transmission algorithm to obtain smooth playback experience and acceptable overhead and utilize limited bandwidth resources efficiently. The distinguishing features of our implementation are as follows: first, the framework works as a middleware and is independent on the streaming service properties; existing P2P streaming application can be deployed in wireless ad-hoc networks with minimum modifications and development cost; second, the proposed algorithm can reduce unnecessary communication overheads compared with traditional algorithms which gain high playback continuity with small chunk size; finally, our scheme can utilize low bandwidth transmission paths rather than discarding them, and thus improve overall performance of the wireless network. We also present a set of experiments to show the effectiveness of the proposed mechanism.

  • Introduction of the Parameter “Approach Ratio” for the Improvement of Higher Delivery Rate with Suppressing Network Resource Consumption in Delay Tolerant Network

    Masato HAYASHI  Susumu MATSUI  Naoki WAKAMIYA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E94-B No:6
      Page(s):
    1669-1679

    The delay/disruption tolerant network (DTN) has been researched actively in the last years because of its high applicability to ubiquitous network services such as sensor networks and intelligent transport system (ITS) networks. An efficient data forwarding method for those network services is one of the key components in DTN due to the limitation of wireless network resources. This paper proposes a new DTN scheme for vehicle network systems by introducing the parameter, “approach ratio”, which represents node movement history. The proposal utilizes passive copy strategy, where nodes within one hop area of packet forwarders receive, copy and store packets (namely, passive copies) for future forwarding, in order to obtain higher delivery rate and lower delivery delay whilst suppressing the network resource consumption. Depending on its approach ratio, a node with passive copy decides whether it forwards the passive copy or not by referring to the approach ratio threshold. The approach ratio allows our proposal to adjust the property of both single-copy type scheme, that can lower network resource consumption, and multi-copy type scheme, that can enhance the performance of delivery rate and delay time. In simulation evaluation, the proposal is compared with three typical existing schemes with respect to network consumption, delivery rate and delivery delay. Our proposal shows the superior performance regarding the targeted purpose. It is shown that the approach ratio plays the significant role to obtain the higher delivery rate and lower delay time, while keeping network resource consumption lower.

  • HMT: A Hybrid Mesh Tree Algorithm in Forming Bluetooth Networks

    Chih-Min YU  

     
    LETTER

      Vol:
    E94-D No:6
      Page(s):
    1178-1180

    In this letter, a new scatternet formation algorithm called hybrid mesh tree for Bluetooth ad hoc networks was proposed. The hybrid mesh tree constructs a mesh-shaped topology in one dense area that is extended by tree-shaped topology to the other areas. First, the hybrid mesh tree uses a designated root to construct a tree-shaped subnet, and then propagates a constant k in its downstream direction to determine new roots. Each new root then asks its upstream master to start a return connection procedure to convert the first tree-shaped subnet into a mesh-shaped subnet. At the same time, each new root repeats the same procedure as the designated root to build its own tree-shaped subnet until the whole scatternet is formed. Simulation results showed that the hybrid mesh tree achieved better network performance than Bluetree and generated an efficient scatternet configuration for various sizes of Bluetooth scatternets.

  • A Self-Scheduling Multi-Channel Cognitive Radio MAC Protocol Based on Cooperative Communications

    Seyoun LIM  Tae-Jin LEE  

     
    PAPER-Network

      Vol:
    E94-B No:6
      Page(s):
    1657-1668

    As the demand for spectrum for future wireless communication services increases, cognitive radio technology has been developed for dynamic and opportunistic spectrum access, which enables the secondary users to use the underutilized licensed spectrum of the primary users. In particular, the recent studies on the MAC protocol for dynamic and opportunistic access have focused on sensing and using the vacant spectrum efficiently. Under the ad-hoc network environment, how the secondary users use the unused channels by the primary users affects the efficient utilization of channels and a cognitive radio system is required to follow the rapid and frequent changes in channel status. In this paper, we propose a self-scheduling multi-channel cognitive MAC (SMC-MAC) protocol, which allows multiple secondary users to transmit data though the sensed idle channels by two cooperative channel sensing algorithms, i.e., fixed channel sensing (FCS) and adaptive channel sensing (ACS), and by slotted contention mechanism to exchange channel request information for self-scheduling. The performance of the proposed SMC-MAC protocol is investigated via analysis and simulations. According to the results, the proposed SMC-MAC protocol is effective in allowing multiple secondary users to transmit data frames effectively on multi-channels and adaptively in response to the primary users' traffic dynamics.

  • Connectivity Modeling Analysis in Flight-Path Based Aviation Ad Hoc Networks

    Thi Xuan My NGUYEN  Yoshikazu MIYANAGA  Chaiyachet SAIVICHIT  

     
    PAPER

      Vol:
    E94-B No:6
      Page(s):
    1606-1616

    In this paper, we propose a framework of connectivity analysis for aviation ad hoc networks on flight paths. First, a general analytical connectivity model for the common one-dimensional ad hoc network is newly developed. Then it is applied for modeling the connectivity of ad hoc networks among aircraft along flight paths where aircraft arrival process follows a Poisson distribution. Connectivity is expressed in terms of connectedness probability of two nodes in the network, connected distance, and network coverage extension factor. An exact closed form derivation of connectedness probability is proposed. The radical effect of mobility on the network connectedness of aircraft over a single flight path is analyzed. The network connectedness probability depends on node density and node distribution, which are derived from node arrival rate and node velocity. Based on these results, the proposed model is extended to the practical case of paths with multi-velocity air traffic classes. Using this model, the critical values of system parameters for the network of aircraft with certain connectivity requirements can be derived. It helps to evaluate network extension capability under the constraints of various system parameters.

  • Polarization-Based Long-Range Communication Directional MAC Protocol for Cognitive Ad Hoc Networks

    Yichen WANG  Pinyi REN  Zhou SU  

     
    PAPER-Radio System

      Vol:
    E94-B No:5
      Page(s):
    1265-1275

    Utilizing available channels to improve the network performance is one of the most important targets for the cognitive MAC protocol design. Using antenna technologies is an efficient way to reach this target. Therefore, in this paper, we propose a novel cognitive MAC protocol, called Polarization-based Long-range Communication Directional MAC Protocol (PLRC-DMAC), for Cognitive Ad Hoc Networks (CAHNs). The proposed protocol uses directional antennas to acquire better spatial reuse and establish long-range communication links, which can support more nodes to access the same channel simultaneously. Moreover, the PLRC-DMAC also uses polarization diversity to allow nodes in the CAHN to share the same channel with Primary Users (PUs). Furthermore, we also propose a Long-range Orientation (LRO) algorithm to orient the long-range nodes. Simulation results show that the LRO algorithm can accurately orient the long-range nodes, and the PLRC-DMAC can significantly increase the network throughput as well as reduce the end-to-end delay.

  • A Dynamic Broadcast Scheme of Emergency Warning Message in Vehicular Ad Hoc Network

    Yun Won CHUNG  Ji Hoon KIM  

     
    LETTER-Network

      Vol:
    E94-B No:5
      Page(s):
    1447-1451

    In the vehicular ad hoc network (VANET), broadcast is used to disseminate emergency warning messages (EWM) in public safety applications and delay is one of the most stringent requirements. Although flooding is the simplest broadcast scheme, it introduces a broadcast storm problem, and numerous broadcast protocols have been proposed for VANET in order to improve the performance of broadcast. In this letter, we analyze the tradeoff between two location-based broadcast protocols, i.e., distance-based relay selection (DBRS) and range-based relay selection (RBRS) schemes under various vehicular densities. Then, we propose a dynamic broadcast scheme, which selects an appropriate scheme from DBRS and RBRS, based on the estimation of vehicle density. The results of a performance analysis show that the proposed scheme dynamically selects the better scheme for varying vehicle density.

81-100hit(320hit)