The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] HOC(320hit)

161-180hit(320hit)

  • Application-Level and User-Level QoS Assessment of Audio-Video IP Transmission over Cross-Layer Designed Wireless Ad Hoc Networks

    Toshiro NUNOME  Shuji TASAKA  Ken NAKAOKA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3205-3215

    This paper performs application-level QoS and user-level QoS assessment of audio-video streaming in cross-layer designed wireless ad hoc networks. In order to achieve high QoS at the user-level, we employ link quality-based routing in the network layer and media synchronization control in the application layer. We adopt three link quality-based routing protocols: OLSR-SS (Signal Strength), AODV-SS, and LQHR (Link Quality-Based Hybrid Routing). OLSR-SS is a proactive routing protocol, while AODV-SS is a reactive one. LQHR is a hybrid protocol, which is a combination of proactive and reactive routing protocols. For application-level QoS assessment, we performed computer simulation with ns-2 where an IEEE 802.11b mesh topology network with 24 nodes was assumed. We also assessed user-level QoS by a subjective experiment with 30 assessors. From the assessment results, we find AODV-SS the best for networks with long inter-node distances, while LQHR outperforms AODV-SS for short inter-node distances. In addition, we also examine characteristics of the three schemes with respect to the application-level QoS in random topology networks.

  • Broadcasting with Randomized Network Coding in Dense Wireless Ad Hoc Networks

    Takahiro MATSUDA  Taku NOGUCHI  Tetsuya TAKINE  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3216-3225

    In this paper, we consider the broadcast storm problem in dense wireless ad hoc networks where interference among densely populated wireless nodes causes significant packet loss. To resolve the problem, we apply randomized network coding (RNC) to the networks. RNC is a completely different approach from existing techniques to resolve the problem, and it reduces the number of outstanding packets in the networks by encoding several packets into a single packet. RNC is a kind of linear network coding, and it is suited to wireless ad hoc networks because it can be implemented in a completely distributed manner. We describe a procedure for implementing the wireless ad hoc broadcasting with RNC. Further, with several simulation scenarios, we provide some insights on the relationship between the system parameters and performance and find that there is the optimal length of coding vectors for RNC in terms of packet loss probability. We also show a guideline for the parameter setting to resolve the broadcast storm problem successfully.

  • A Novel MAC Protocol for QoS in Ad Hoc Wireless Networks

    Kiyoshi TAKAHASHI  Takuya TERASAWA  Toshinori TSUBOI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:10
      Page(s):
    3297-3306

    We propose a medium access control (MAC) protocol for real-time applications in one-hop ad-hoc wireless networks. It is a distributed mechanism that takes account of priority and has a bounded packet delay. Nodes use energy signals to contend for the right to access the channel. Nodes, which have a packet to transmit, send energy signals or listen to the channel based on their binary frame. The node that has sent energy signals and has not heard any energy signals wins the right to access the channel. We use two schemes to determine the binary frame: at the beginning of a session, a node determines it based on its priority level and a random number; after successful transmission, based on a count of successful packet transmissions. With the first scheme, in order to reduce contention losses, the nodes that had won the right to access the channel but failed in transmission have priority over the other nodes. With the second scheme, the node that has the largest count, the one that has been waiting the longest, can send a packet without risking collision. The protocol provides higher probability of successful transmission and a limit on maximum packet delay. An analysis of the protocol provides conditions for the protocol to be stable. We evaluate the performance of the proposed protocol using simulations of a network with a mixed population of data and real-time nodes, whose source is constant bit rate (CBR) and a two state Markov on/off process.

  • Forward Interference Avoidance in Ad Hoc Communications Using Adaptive Array Antennas

    Tomofumi SAKAGUCHI  Yukihiro KAMIYA  Takeo FUJII  Yasuo SUZUKI  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E91-B No:9
      Page(s):
    2940-2947

    Wireless ad hoc communications such as ad hoc networks have been attracting researchers' attention. They are expected to become a key technology for "ubiquitous" networking because of the ability to configure wireless links by nodes autonomously, without any centralized control facilities. Adaptive array antennas (AAA) have been expected to improve the network efficiency by taking advantage of its adaptive beamforming capability. However, it should be noted that AAA is not almighty. Its interference cancellation capability is limited by the degree-of-freedom (DOF) and the angular resolution as a function of the number of element antennas. Application of AAA without attending to these problems can degrade the efficiency of the network. Let us consider wireless ad hoc communication as a target application for AAA, taking advantage of AAA's interference cancellation capability. The low DOF and insufficient resolution will be crucial problems compared to other wireless systems, since there is no centralized facility to control the nodes to avoid interferences in such systems. A number of interferences might impinge on a node from any direction of arrival (DOA) without any timing control. In this paper, focusing on such limitations of AAA applied in ad hoc communications, we propose a new scheme, Forward Interference Avoidance (FIA), using AAA for ad hoc communications in order to avoid problems caused by the limitation of the AAA capability. It enables nodes to avoid interfering with other nodes so that it increases the number of co-existent wireless links. The performance improvement of ad hoc communications in terms of the number of co-existent links is investigated through computer simulations.

  • A Hybrid Greedy Routing with Location Information for Mobile Ad Hoc Networks

    Hiroshi NAKAGAWA  Kazuyuki NAKAMARU  Tomoyuki OHTA  Yoshiaki KAKUDA  

     
    PAPER-Ad Hoc Networks

      Vol:
    E91-B No:9
      Page(s):
    2806-2817

    Recently, in mobile ad hoc networks, routing schemes using location information have been proposed. Most of these schemes assume that the source node already knows the location information of the destination node. However, since all nodes are always moving, it is difficult to apply this assumption to the real mobile ad hoc environment. In order to cope this difficulty, this paper presents a new routing scheme HGR (a Hybrid Greedy Routing with location and velocity information), which considers the location and velocity information of the destination node and the neighboring nodes. In HGR, when a source node creates a route to a destination node, the future location of neighboring nodes and the destination node predicted by the source node is calculated using these location and velocity information. And the source node sends data packets to the neighboring node that is the closest to the destination node based on these predicted location and velocity information. This paper shows that HGR achieves high data delivery ratio and fewer overheads for the route creation and maintenance through simulation experiments.

  • Introduction to Blueweb: A Decentralized Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

    Chih-Min YU  Chia-Chi HUANG  

     
    LETTER

      Vol:
    E91-B No:9
      Page(s):
    2873-2875

    In this letter, a decentralized scatternet formation algorithm called Bluelayer is proposed. First, Bluelayer uses a designated root to construct a tree-shaped subnet and propagates an integer variable k1 called counter limit as well as a constant k in its downstream direction to determine new roots. Then each new root asks its upstream master to start a return connection procedure to convert the tree-shaped subnet into a web-shaped subnet for its immediate upstream root. At the same time, each new root repeats the same procedure as the root to build its own subnet until the whole scatternet is formed. Simulation results show that Bluelayer achieves good network scalability and generates an efficient scatternet configuration for various sizes of Bluetooth ad hoc network.

  • Dynamic Channel Selection with Snooping for Multi-Channel Multi-Hop Wireless Networks

    Myunghwan SEO  Joongsoo MA  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E91-B No:8
      Page(s):
    2752-2756

    The dynamic channel selection mechanism used in existing multi-channel MAC protocols selects an idle data channel based on channel usage information from one-hop neighbor nodes. However, this method can cause multi-channel hidden node problem in multi-hop wireless networks. This letter proposes a new approach to channel selection. Nodes snoop data channels during idle times and then select an idle data channel within the carrier sensing range using both the snooping results and the channel usage information. Our simulation results verify that the proposed channel selection approach can effectively avoid the multi-channel hidden node problem and improve the networkwide performance.

  • General Ripple Mobility Model: A Novel Mobility Model of Uniform Spatial Distribution and Diverse Average Speed

    Chun-Hung CHEN  Ho-Ting WU  Kai-Wei KE  

     
    PAPER-Network

      Vol:
    E91-B No:7
      Page(s):
    2224-2233

    Simulations are often deployed to evaluate proposed mechanisms or algorithms in Mobile Ad Hoc Networks (MANET). In MANET, the impacts of some simulation parameters are noticeable, such as transmission range, data rate etc. However, the effect of mobility model is not clear until recently. Random Waypoint (RWP) is one of the most applied nodal mobility models in many simulations due to its clear procedures and easy employments. However, it exhibits the two major problems: decaying average speed and border effect. Both problems will overestimate the performance of the employed protocols and applications. Although many recently proposed mobility models are able to reduce or eliminate the above-mentioned problems, the concept of Diverse Average Speed (DAS) has not been introduced. DAS aims to provide different average speeds within the same speed range. In most mobility models, the average speed is decided when the minimum and maximum speeds are set. In this paper, we propose a novel mobility model, named General Ripple Mobility Model (GRMM). GRMM targets to provide a uniform nodal spatial distribution and DAS without decaying average speed. The simulations and analytic results have demonstrated the merits of the outstanding properties of the GRMM model.

  • On Throughput Improvement of Wireless Ad Hoc Networks with Hidden Nodes

    Hong-Seok CHOI  Jong-Tae LIM  

     
    LETTER-Network

      Vol:
    E91-B No:7
      Page(s):
    2397-2400

    In this letter, we present the throughput analysis of the wireless ad hoc networks based on the IEEE 802.11 MAC (Medium Access Control). Especially, our analysis includes the case with the hidden node problem so that it can be applied to the multi-hop networks. In addition, we suggest a new channel access control algorithm to maximize the network throughput and show the usefulness of the proposed algorithm through simulations.

  • Route-Split Routing Resilient to Simultaneous Failure for Mobile Ad Hoc Networks

    Tsuyoshi MIZUMOTO  Tomoyuki OHTA  Yoshiaki KAKUDA  

     
    PAPER

      Vol:
    E91-A No:7
      Page(s):
    1625-1633

    As the performance of each node becomes higher, it is expected that the ad hoc network is used for the community network in which a few thousands of mobile nodes exist. In such a network, the number of hops between a source node and a destination node also becomes longer. However, as the route becomes longer, it is difficult to provide the robust and reliable route for mobile ad hoc networks since the multiple route breaks occur at the same time due to the topology change. Therefore, this paper proposes a Route-Split Routing resilient to simultaneous failure (RSR). RSR sets up multiple Subroute Management Nodes (SMN's) on the route and each SMN manages the subroute between the SMN and the neighboring SMN. When the multiple route breaks occur at the same time, each subroute is repaired by the SMN. Consequently, RSR can reduce the number of control packets used for the route repair and mitigate the network congestion even in case that the number of nodes in the network becomes very larger.

  • Dialogue-Based Broadcasting Protocol for Wireless Ad Hoc Networks

    Keigo HASEGAWA  Takeo FUJII  Kenta UMEBAYASHI  Yukihiro KAMIYA  Yasuo SUZUKI  

     
    PAPER

      Vol:
    E91-A No:7
      Page(s):
    1642-1651

    This paper proposes a MAC protocol for efficient broadcasting in wireless ad hoc networks. Pure flooding leads to serious redundant broadcasts, packet contention and packet collisions, known as the broadcast storm problem. This paper focuses on how to reduce the redundant broadcasts. Several protocols to achieve efficient broadcasting have been proposed. However a trade-off exists between the reachability and the broadcasting ratio, which is the ratio of the number of the broadcasting nodes to the number of received nodes. This paper proposes a new MAC protocol for on-demand broadcasting, which is referred to as dialogue-based protocol in order to resolve the trade-off. The dialogue-based protocol employs additional massages which are called as request packets and reply signals. They are exchanged in an on-demand manner, in order that relay candidate nodes recognize its neighbor nodes status whether they have already received the broadcast packets. Finally, by computer simulations, this paper presents that the dialogue-based scheme combines high reachability with low broadcasting ratio by using the low additional massages.

  • Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks

    Guowei CHEN  Kenichi ITOH  Takuro SATO  

     
    PAPER-Network

      Vol:
    E91-B No:7
      Page(s):
    2265-2271

    Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e.g. BLR [1] , IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.

  • A Novel Approach to Overlay Multicasting Schemes for Multi-Hop Ad-Hoc Networks

    Namhi KANG  Jejun OH  Younghan KIM  

     
    PAPER-Network

      Vol:
    E91-B No:6
      Page(s):
    1862-1873

    Multicast is an efficient transport mechanism for group-based community communications and mobile ad-hoc networks (MANET) is recently regarded as a promising solution for supporting ubiquitous computing as an underlying network technology. However, it is challenging to deploy the multicast mechanism used in a wired network directly into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome these limitations. In MANET, especially, overlay multicasting schemes present several advantages over network-based multicasting schemes. However we have observed a common limitation of previously proposed overlay multicasting schemes. They introduce redundant data transmissions that waste network bandwidth and the battery of relay nodes. The observation motivated us to propose an efficient way to create and maintain a "semi-overlay structure" that utilizes a few nonmember nodes selected as branch nodes. The proposed scheme, called "SOMRP (Semi-overlay multicast routing protocol)," has been evaluated by using extensive network simulation in two different scenarios, comparing the performance of SOMRP with two previously proposed schemes. Simulation results show that SOMRP outperforms the two schemes in terms of the packet delivery ratio, transmission cost and end-to-end delay.

  • Signal Strength Based Energy Efficient Routing for Ad Hoc Networks

    Masaki BANDAI  Satoshi NAKAYAMA  Takashi WATANABE  

     
    PAPER-Network

      Vol:
    E91-B No:4
      Page(s):
    1006-1014

    In this paper, we propose a novel energy-efficient route-discovery scheme with transmission power control (TPC) for ad hoc networks. The proposed scheme is very simple and improves energy efficiency without any information about neighbor nodes. In the proposed scheme, when a node receives a route request (RREQ), the node calculates the routing-level backoff time as being inversely proportional to the received power of the RREQ. After the route discovery, source and intermediate nodes transmit packets by the power-controlled medium access control (MAC) protocol. In addition, we propose an extended version of the proposed scheme for discrete power control devices. Simulation results demonstrate the proposed schemes can discover more energy efficient routes than the conventional schemes.

  • On the Achievable Efficiency-Fairness Tradeoff in Utility-Optimal MAC Protocols

    Jang-Won LEE  Mung CHIANG  A. Robert CALDERBANK  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E91-B No:4
      Page(s):
    1231-1234

    We use the network utility maximization (NUM) framework to create an efficient and fair medium access control (MAC) protocol for wireless networks. By adjusting the parameters in the utility objective functions of NUM problems, we control the tradeoff between efficiency and fairness of radio resource allocation through a rigorous and systematic design. In this paper, we propose a scheduling-based MAC protocol. Since it provides an upper-bound on the achievable performance, it establishes the optimality benchmarks for comparison with other algorithms in related work.

  • An Enhanced Route Recovery Protocol for Mobile Ad Hoc Networks

    Sangkyung KIM  Noyeul PARK  Changhwa KIM  Seung-sik CHOI  

     
    LETTER-Network

      Vol:
    E91-B No:2
      Page(s):
    597-600

    In case of link failures, many ad hoc routing protocols recover a route by employing source-initiated route re-discovery, but this approach can degrade system performance. Some use localized route recovery, which may yield non-optimal paths. Our proposal provides a mechanism that can enhance the overall routing performance by initiating route recovery at the destination node. We elucidate the effects through simulations including comparisons with AODV and AODV with local repair.

  • Multiple Tree Multicast Ad Hoc On-Demand Distance Vector (MT-MAODV) Routing Protocol for Video Multicast over Mobile Ad Hoc Networks

    Chee-Onn CHOW  Hiroshi ISHII  

     
    PAPER-Network

      Vol:
    E91-B No:2
      Page(s):
    428-436

    Video multicast over wireless medium has gained increasing popularity in a wide range of applications, such as video-on-demand and group video conferencing. With mobile ad hoc networks emerging as a promising solution for future ubiquitous communications, supporting reliable video multicast over mobile ad hoc networks is a timely research topic. In this paper we tackle this issue by using multiple tree multicast routing protocol. Specifically, we introduce an extension to the Multicast Ad Hoc On-demand Distance Vector (MAODV) routing protocol to construct two optimally disjoint trees in a single routine. The extended protocol is called Multiple Tree Multicast Ad Hoc On-demand Distance Vector (MT-MAODV) routing protocol. In order to distribute the video evenly and independently between these disjoint trees, the Multiple Description Coding (MDC) scheme is used for video coding. Simulation shows that the proposed protocol demonstrates video multicast with better quality than the conventional video multicast using a single tree only.

  • Adaptive Power Control MAC in Wireless Ad Hoc Networks

    Hong-Seok CHOI  Hee-Jung BYUN  Jong-Tae LIM  

     
    LETTER-Network

      Vol:
    E91-B No:1
      Page(s):
    309-313

    In this letter, we suggest APMAC (Adaptive Power Control MAC) for wireless ad hoc networks. APMAC is based on the single channel environment and improves the throughput and the energy efficiency simultaneously. Furthermore, the APMAC prevents the unfair channel starvation among the transmission pairs. We verify the performance of the APMAC through simulations.

  • Topology Management and Route Establishment Method for Base Station Networks Using Cognitive Radio

    Yujin NOISHIKI  Misato SASAKI  Akira IDOUE  Kazunori TAKEUCHI  

     
    PAPER-Cognitive Network

      Vol:
    E91-B No:1
      Page(s):
    29-37

    Cognitive radio, which utilizes the radio frequency spectrum efficiently by recognizing radio resource availability, is an attractive technology for overcoming the shortage of radio frequency. From the perspective of networking, cognitive radio technologies are also useful since they allow flexible network construction. This paper proposes base station networks using cognitive radio technologies. In order to achieve efficient utilization of the radio frequency spectrum and flexible network construction, we also propose a topology management and route control method for our proposed base station network. Our method shares the status of the wireless links along with topology information and establishes routes by using this information. Through simulation, we evaluate that our method significantly improves the throughput by efficient utilization of the radio frequency spectrum. Moreover, we demonstrate that our method works well when the size of the network gets larger.

  • CP-TDMA: Coloring- and Probability-Based TDMA Scheduling for Wireless Ad Hoc Networks

    Xuedan ZHANG  Jun HONG  Lin ZHANG  Xiuming SHAN  Victor O. K. LI  

     
    LETTER-Network

      Vol:
    E91-B No:1
      Page(s):
    322-326

    This paper addresses the issue of transmission scheduling in wireless ad hoc networks. We propose a Time Division Multiple Access (TDMA) scheduling scheme based on edge coloring and probabilistic assignment, called CP-TDMA. We categorize the conflicts suffered by wireless links into two types: explicit conflicts and implicit conflicts, and utilize two different strategies to deal with them. Explicit conflicts are avoided completely by a simple distributed edge-coloring algorithm µ-M, and implicit conflicts are minimized by applying probabilistic time slot assignments to links. We evaluate CP-TDMA analytically and numerically, and find that CP-TDMA, which requires only local information exhibits a better performance than previous work.

161-180hit(320hit)