EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Multihop Wireless Networks

Download or read book Multihop Wireless Networks written by Kai Zeng and published by John Wiley & Sons. This book was released on 2011-07-13 with total page 211 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol design, geographic opportunistic routing, opportunistic broadcasting, and security issues associated with opportunistic routing, etc. Furthermore, the authors discuss technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. The book brings together all the new results on this topic in a systematic, coherent and unified presentation and provides a much needed comprehensive introduction to this topic. Key Features: Addresses opportunistic routing, an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks Discusses the technological challenges lying behind this new technology, and covers a wide range of practical implementation issues Explores many fundamental research issues for this new concept, including the basic principles of opportunistic routing, performance limits and performance improvement, and compares them to traditional routing (e.g. energy efficiency and distributed opportunistic routing protocol design, broadcasting, and security issues) Covers technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. This book provides an invaluable reference for researchers working in the field of wireless networks and wireless communications, and Wireless professionals. Graduate students will also find this book of interest.

Book Opportunistic Routing in Multihop Wireless Networks

Download or read book Opportunistic Routing in Multihop Wireless Networks written by Kai Zeng and published by . This book was released on 2008 with total page 402 pages. Available in PDF, EPUB and Kindle. Book excerpt: Abstract: Opportunistic routing (OR) takes advantages of the spatial diversity and broadcast nature of wireless networks to combat the time-varying links by involving multiple neighboring nodes (forwarding candidates) for each packet relay. This dissertation studies the properties, energy efficiency, capacity, throughput, protocol design and security issues about OR in multihop wireless networks. Firstly, we study geographic opportunistic routing (GOR), a variant of OR which makes use of nodes' location information. We identify and prove three important properties of GOR. The first one is on prioritizing the forwarding candidates according to their geographic advancements to the destination. The second one is on choosing the forwarding candidates based on their advancements and link qualities in order to maximize the expected packet advancement (EPA) with different number of forwarding candidates. The third one is on the concavity of the maximum EPA in respect to the number of forwarding candidates. We further propose a local metric, EPA per unit energy consumption, to tradeoff the routing performance and energy efficiency for GOR. Leveraging the proved properties of GOR, we propose two efficient algorithms to select and prioritize forwarding candidates to maximize the local metric. Secondly, capacity is a fundamental issue in multihop wireless networks. We propose a framework to compute the end-to-end throughput bound or capacity of OR in single/multirate systems given OR strategies (candidate selection and prioritization). Taking into account wireless interference and unique properties of OR, we propose a new method of constructing transmission conflict graphs, and we introduce the concept of concurrent transmission sets to allow the proper formulation of the maximum end-to-end throughput problem as a maximum-flow linear programming problem subject to the transmission conflict constraints. We also propose two OR metrics: expected medium time (EMT) and expected advancement rate (EAR), and the corresponding distributed and local rate and candidate set selection schemes, the Least Medium Time OR (LMTOR) and the Multirate Geographic OR (MGOR). We further extend our framework to compute the capacity of OR in multi-radio multi-channel systems with dynamic OR strategies. We study the necessary and sufficient conditions for the schedulability of a traffic demand vector associated with a transmitter to its forwarding candidates in a concurrent transmission set. We further propose an LP approach and a heuristic algorithm to obtain an opportunistic forwarding strategy scheduling that satisfies a traffic demand vector. Our methodology can be used to calculate the end-to-end throughput bound of OR in multi-radio/channel/rate multihop wireless networks, as well as to study the OR behaviors (such as candidate selection and prioritization) under different network configurations. Thirdly, protocol design of OR in a contention-based medium access environment is an important and challenging issue. In order to avoid duplication, we should ensure only the "best" receiver of each packet to forward it in an efficient way. We investigate the existing candidate coordination schemes and propose a "fast slotted acknowledgment" (FSA) to further improve the performance of OR by using a single ACK to coordinate the forwarding candidates with the help of the channel sensing technique. Furthermore, we study the throughput of GOR in multi-rate and single-rate systems. We introduce a framework to analyze the one-hop throughput of GOR, and provide a deeper insight on the trade-off between the benefit (packet advancement, bandwidth, and transmission reliability) and cost (medium time delay) associated with the node collaboration. We propose a local metric named expected one-hop throughput (EOT) to balance the benefit and cost. Finally, packet reception ratio (PRR) has been widely used as an indicator of the link quality in multihop wireless networks. Many routing protocols including OR in wireless networks depend on the PRR information to make routing decision. Providing accurate link quality measurement (LQM) is essential to ensure the right operation of these routing protocols. However, the existing LQM mechanisms are subject to malicious attacks, thus can not guarantee to provide correct link quality information. We analyze the security vulnerabilities in the existing link quality measurement (LQM) mechanisms and propose an efficient broadcast-based secure LQM (SLQM) mechanism, which prevents the malicious attackers from reporting a higher PRR than the actual one. We analyze the security strength and the cost of the proposed mechanism.

Book Rate Adaptive Opportunistic Routing in Multi hop Wireless Networks

Download or read book Rate Adaptive Opportunistic Routing in Multi hop Wireless Networks written by Shriniwas B. Kulkarni and published by . This book was released on 2008 with total page 124 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks

Download or read book Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks written by Mahmood Salehi and published by . This book was released on 2017 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in wireless sensor, mobile ad-hoc, and vehicular networks is a crucial operation having significantly attracted scientists' attention during the past years. Opportunistic routing, however, is a novel and promising approach, which is still an ongoing research paradigm. The purpose of opportunistic routing protocols is to increase the reliability of delivering data packets to their destination by utilizing the broadcast nature of wireless networks and selecting a set of nodes, instead of only one, as potential next-hop candidates. Apart from the reliability, security and trustworthiness of communications is also a challenging task. More specifically, almost all traditional and opportunistic routing protocols require cooperation of all network nodes to complete the routing process. However, some nodes in the network may be compromised and avoid collaboration with others due to various selfish or malicious motivations. The focus of this thesis is on modeling security challenges and developing trust-based opportunistic routing protocols. This way, communication between nodes will not only benefit from the reliability of opportunistic routing methods, but also from the security of trust and reputation management schemes. For this purpose, a novel trust-based opportunistic routing protocol is proposed that introduces three different candidate selection metrics known as RTOR, TORDP, and GEOTOR. Such metrics have been designed to address specific characteristics of opportunistic routing protocols. In continue, a watchdog mechanism is proposed to assist nodes in monitoring their candidates, recalculating their trust value, and finally replacing malicious candidates with benign ones. Afterwards, an analytical approach is introduced using Discrete-Time Markov Chain to demonstrate the effect of malicious nodes on different parameters of a wireless network that uses opportunistic routing. In this model, a new method of calculating packet drop ratio is introduced to represent the effect of attackers. The model is then applied on different well-known opportunistic routing protocols and results of the model are verified by simulation. Finally, the proposed analytical model is extended to include a defensive mechanism against adversary nodes. In fact, a packet salvaging mechanism is developed through which backup candidates attempt to save some of the maliciously dropped data packets. Different related network parameters such as delivery ratio, salvage ratio, direct-delivery ratio, etc. are then introduced, calculated, and reported using the introduced model.

Book Opportunistic Routing in Multi hop Wireless Networks

Download or read book Opportunistic Routing in Multi hop Wireless Networks written by Sanjit Zubin Biswas and published by . This book was released on 2005 with total page 94 pages. Available in PDF, EPUB and Kindle. Book excerpt: (Cont.) An evaluation of an implementation on a 38-node 802.11b test-bed shows that ExOR improves bulk data transfer throughput for most node pairs when compared with unicast routing. For pairs between which unicast uses one or two hops, ExOR's robust batch maps prevent unnecessary retransmissions, increasing throughput by nearly 50%. For longer unicast routes, ExOR takes advantage of spatial diversity, providing gains of a factor of two to four when using a batch size of 10 packets.

Book Performance Analysis and Protocol Design of Opportunistic Routing in Multi hop Wireless Networks

Download or read book Performance Analysis and Protocol Design of Opportunistic Routing in Multi hop Wireless Networks written by Chun Pong Luk and published by . This book was released on 2008 with total page 250 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Multi channel Opportunistic Routing in Multi hop Wireless Networks

Download or read book Multi channel Opportunistic Routing in Multi hop Wireless Networks written by Anatolij Zubow and published by . This book was released on 2006 with total page 20 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Opportunistic Routing and Network Coding in Multi hop Wireless Mesh Networks

Download or read book Opportunistic Routing and Network Coding in Multi hop Wireless Mesh Networks written by Chen Zhang and published by . This book was released on 2018 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The rapid advancements in communication and networking technologies boost the capacity of wireless networks. Multi-hop wireless networks are extremely exciting and rapidly developing areas and have been receiving an increasing amount of attention by researchers. Due to the limited transmission range of the nodes, end-to-end nodes may situate beyond direct radio transmission ranges. Intermediate nodes are required to forward data in order to enable the communication between nodes that are far apart. Routing in such networks is a critical issue. Opportunistic routing has been proposed to increase the network performance by utilizing the broadcast nature of wireless media. Unlike traditional routing, the forwarder in opportunistic routing broadcasts date packets before the selection of the next hop. Therefore, opportunistic routing can consider multiple downstream nodes as potential candidate nodes to forward data packets instead of using a dedicated next hop. Instead of simply forwarding received packets, network coding allows intermediate nodes to combine all received packets into one or more coded packets. It can further improve network throughput by increasing the transmission robustness and efficiency. In this dissertation, we will study the fundamental components, related issues and associated challenges about opportunistic routing and network coding in multi-hop wireless networks. Firstly, we focus on the performance analysis of opportunistic routing by the Discrete Time Markov Chain (DTMC). Our study demonstrates how to map packet transmissions in the network with state transitions in a Markov chain. We will consider pipelined data transfer and evaluate opportunistic routing in different wireless networks in terms of expected number of transmissions and time slots. Secondly, we will propose a regional forwarding schedule to optimize the coordination of opportunistic routing. In our coordination algorithm, the forwarding schedule is limited to the range of the transmitting node rather than among the entire set of forwarders. With such an algorithm, our proposal can increase the throughput by deeper pipelined transmissions. Thirdly, we will propose a mechanism to support TCP with opportunistic routing and network coding, which are rarely incorporated with TCP because the frequent occurrences of out-of-order arrivals in opportunistic routing and long decoding delay in network coding overpower TCP congestion control. Our solution completes the control feedback loop of TCP by creating a bridge between the sender and the receiver. The simulation result shows that our protocol significantly outperforms TCP/IP in terms of network throughput in different topologies of wireless networks.

Book Multihop Wireless Networks

Download or read book Multihop Wireless Networks written by Kai Zeng and published by John Wiley & Sons. This book was released on 2011-08-01 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol design, geographic opportunistic routing, opportunistic broadcasting, and security issues associated with opportunistic routing, etc. Furthermore, the authors discuss technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. The book brings together all the new results on this topic in a systematic, coherent and unified presentation and provides a much needed comprehensive introduction to this topic. Key Features: Addresses opportunistic routing, an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks Discusses the technological challenges lying behind this new technology, and covers a wide range of practical implementation issues Explores many fundamental research issues for this new concept, including the basic principles of opportunistic routing, performance limits and performance improvement, and compares them to traditional routing (e.g. energy efficiency and distributed opportunistic routing protocol design, broadcasting, and security issues) Covers technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. This book provides an invaluable reference for researchers working in the field of wireless networks and wireless communications, and Wireless professionals. Graduate students will also find this book of interest.

Book Routing in Opportunistic Networks

Download or read book Routing in Opportunistic Networks written by Isaac Woungang and published by Springer Science & Business Media. This book was released on 2013-09-10 with total page 421 pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Book Opportunistic Routing in Wireless Networks

Download or read book Opportunistic Routing in Wireless Networks written by Tara Javidi and published by . This book was released on 2016 with total page 137 pages. Available in PDF, EPUB and Kindle. Book excerpt: Wireless multi-hop networks have become an important part of many modern communication systems. Opportunistic routing aims to overcome the deficiencies of conventional routing on wireless multi-hop networks, by specifically utilizing wireless broadcast opportunities and receiver diversity. Opportunistic routing algorithms, which are specifically optimized to incorporate into the routing decisions a model of wireless transmission, take advantage of scheduling, multi-user, and receiver diversity gains and result in significant reduction in the expected cost of routing per packet. The ability of the algorithm to take advantage of the aspects of wireless transmission, however, depends on the scalability and the additional overhead associated with the opportunistic routing as well as the availability of side information regarding wireless channel statistics, topology, etc. This monograph sheds light on the performance gains associated with incorporating into the routing strategy the nature of wireless transmission. This monograph first provides an overview of various opportunistic distance-vector algorithms that have been developed to incorporate wireless transmission and routing opportunities. Furthermore, an optimal opportunistic distance metric is proposed whose performance is examined against the performance of several routing algorithms from the literature. The performance is examined first in analytical examples, then via simulation to identify the strengths of the optimal opportunist routing algorithm. To allow for a scalable and distributed solution, the distributed computation of this optimal distance-metric is provided. The performance of a distributed implementation of the optimal opportunistic routing algorithm is also examined via simulation. In addition to the construction of the opportunistic schemes in centralized and distributed fashions, this monograph also addresses how learning the wireless medium can be efficiently incorporated in the structure of routing algorithm. Finally, this monograph examines the dynamic congestion-based distance metric and its performance against other congestion aware solutions in the literature.

Book Performance Evaluation of Opportunistic Routing Protocols for Multi hop Wireless Networks

Download or read book Performance Evaluation of Opportunistic Routing Protocols for Multi hop Wireless Networks written by Sergio Rolando Guercin and published by . This book was released on 2019 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Nowadays, Opportunistic Routing (OR) is widely considered to be the most important paradigm for Multi-hop wireless networks (MWNs). It exploits the broadcast nature of wireless medium to propagate information from one point to another within the network. In OR scheme, when a node has new information to share, it rst needs to set its forwarding list which include the IDs and/or any relevant information to its best suited neighboring nodes. This operation is supported by the use of appropriate metrics. Then, it executes a coordination algorithm allowing transmission reliability and high throughput among the next-hop forwarders. In this paper, we provide a comprehensive guide to understand the characteristics and challenges faced in the area of opportunistic routing protocols in MWNs. Moreover, since the planet we live on is largely covered by water, OR protocols have gained much attention during the last decade in real-time aquatic applications, such as oil/chemical spill monitoring, ocean resource management, anti-submarine missions and so on. One of the major problems in Underwater Wireless Sensor Network (UWSNs) is determining an e cient and reliable routing methodology between the source node and the destination node. Therefore, designing e cient and robust routing protocols for UWSNs became an attractive topic for researchers. This paper seeks to address in detail the key factors of underwater sensor network. Furthermore, it calls into question 5 state-of-the-art routing protocols proposed for UWSN: The Depth-Based Routing protocol (DBR), the Energy-E cient Depth-Based Routing protocol (EEDBR), the Hydraulic-pressure-based anycast routing protocol (Hydrocast), the Geographic and opportunistic routing protocol with Depth Adjustment for mobile underwater sensor networks (GEDAR), and the Void- Aware Pressure Routing for underwater sensor networks (VAPR). Finally, it covers the performance of those protocol through the use of the R programming language.

Book Opportunistic Networks

Download or read book Opportunistic Networks written by Khaleel Ahmad and published by CRC Press. This book was released on 2018-10-03 with total page 314 pages. Available in PDF, EPUB and Kindle. Book excerpt: Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Book Multi hop Routing for Wireless Mesh Networks

Download or read book Multi hop Routing for Wireless Mesh Networks written by Abhijeet Bhorkar and published by . This book was released on 2012 with total page 138 pages. Available in PDF, EPUB and Kindle. Book excerpt: Wireless Mesh networks have the potential to provide inexpensive and quick access to the internet for military communications, surveillance, education, healthcare and disaster management. This work caters to the growing high-bandwidth demands by providing low delay and high throughput by designing efficient, robust routing algorithms for wireless mesh networks. Chapters 2 and 3 of this dissertation describe adaptive routing algorithms that opportunistically route the packets in the absence of reliable knowledge about channel statistics and the network model. We design two adaptive routing algorithms, Distributed Opportunistic Routing (d-AdaptOR) and No Regret Routing (NRR), which minimize the expected number of transmissions and thus improving the throughput. The remainder of the dissertation concerns with the design routing algorithms to avoid congestion in the network. In Chapter 4, we describe a Distributed Opportunistic Routing algorithm with Congestion Diversity (ORCD) which employs receiver diversity and minimizes end-end delay. In Chapter 5, we present the Congestion Diversity Protocol (CDP), a distributed routing protocol for 802.11-based multi-hop wireless networks that combines important aspects of shortest-path and back-pressure routing to achieve improved end-end delay performance. This work reports on a practical (hardware and software) implementation of CDP in an indoor Wi-Fi testbed.

Book Opportunistic and Cooperative Forwarding in Mobile Ad hoc Networks with Light weight Proactive Source Routing

Download or read book Opportunistic and Cooperative Forwarding in Mobile Ad hoc Networks with Light weight Proactive Source Routing written by Zehua Wang and published by . This book was released on 2011 with total page 214 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Artificial Intelligent Techniques for Wireless Communication and Networking

Download or read book Artificial Intelligent Techniques for Wireless Communication and Networking written by R. Kanthavel and published by John Wiley & Sons. This book was released on 2022-02-24 with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt: ARTIFICIAL INTELLIGENT TECHNIQUES FOR WIRELESS COMMUNICATION AND NETWORKING The 20 chapters address AI principles and techniques used in wireless communication and networking and outline their benefit, function, and future role in the field. Wireless communication and networking based on AI concepts and techniques are explored in this book, specifically focusing on the current research in the field by highlighting empirical results along with theoretical concepts. The possibility of applying AI mechanisms towards security aspects in the communication domain is elaborated; also explored is the application side of integrated technologies that enhance AI-based innovations, insights, intelligent predictions, cost optimization, inventory management, identification processes, classification mechanisms, cooperative spectrum sensing techniques, ad-hoc network architecture, and protocol and simulation-based environments. Audience Researchers, industry IT engineers, and graduate students working on and implementing AI-based wireless sensor networks, 5G, IoT, deep learning, reinforcement learning, and robotics in WSN, and related technologies.