EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Performance Evaluation of Opportunistic Routing Protocols for Multi hop Wireless Networks

Download or read book Performance Evaluation of Opportunistic Routing Protocols for Multi hop Wireless Networks written by Sergio Rolando Guercin and published by . This book was released on 2019 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Nowadays, Opportunistic Routing (OR) is widely considered to be the most important paradigm for Multi-hop wireless networks (MWNs). It exploits the broadcast nature of wireless medium to propagate information from one point to another within the network. In OR scheme, when a node has new information to share, it rst needs to set its forwarding list which include the IDs and/or any relevant information to its best suited neighboring nodes. This operation is supported by the use of appropriate metrics. Then, it executes a coordination algorithm allowing transmission reliability and high throughput among the next-hop forwarders. In this paper, we provide a comprehensive guide to understand the characteristics and challenges faced in the area of opportunistic routing protocols in MWNs. Moreover, since the planet we live on is largely covered by water, OR protocols have gained much attention during the last decade in real-time aquatic applications, such as oil/chemical spill monitoring, ocean resource management, anti-submarine missions and so on. One of the major problems in Underwater Wireless Sensor Network (UWSNs) is determining an e cient and reliable routing methodology between the source node and the destination node. Therefore, designing e cient and robust routing protocols for UWSNs became an attractive topic for researchers. This paper seeks to address in detail the key factors of underwater sensor network. Furthermore, it calls into question 5 state-of-the-art routing protocols proposed for UWSN: The Depth-Based Routing protocol (DBR), the Energy-E cient Depth-Based Routing protocol (EEDBR), the Hydraulic-pressure-based anycast routing protocol (Hydrocast), the Geographic and opportunistic routing protocol with Depth Adjustment for mobile underwater sensor networks (GEDAR), and the Void- Aware Pressure Routing for underwater sensor networks (VAPR). Finally, it covers the performance of those protocol through the use of the R programming language.

Book Multihop Wireless Networks

Download or read book Multihop Wireless Networks written by Kai Zeng and published by John Wiley & Sons. This book was released on 2011-07-13 with total page 211 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol design, geographic opportunistic routing, opportunistic broadcasting, and security issues associated with opportunistic routing, etc. Furthermore, the authors discuss technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. The book brings together all the new results on this topic in a systematic, coherent and unified presentation and provides a much needed comprehensive introduction to this topic. Key Features: Addresses opportunistic routing, an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks Discusses the technological challenges lying behind this new technology, and covers a wide range of practical implementation issues Explores many fundamental research issues for this new concept, including the basic principles of opportunistic routing, performance limits and performance improvement, and compares them to traditional routing (e.g. energy efficiency and distributed opportunistic routing protocol design, broadcasting, and security issues) Covers technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. This book provides an invaluable reference for researchers working in the field of wireless networks and wireless communications, and Wireless professionals. Graduate students will also find this book of interest.

Book Performance Analysis and Protocol Design of Opportunistic Routing in Multi hop Wireless Networks

Download or read book Performance Analysis and Protocol Design of Opportunistic Routing in Multi hop Wireless Networks written by Chun Pong Luk and published by . This book was released on 2008 with total page 250 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks

Download or read book Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks written by Mahmood Salehi and published by . This book was released on 2017 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in wireless sensor, mobile ad-hoc, and vehicular networks is a crucial operation having significantly attracted scientists' attention during the past years. Opportunistic routing, however, is a novel and promising approach, which is still an ongoing research paradigm. The purpose of opportunistic routing protocols is to increase the reliability of delivering data packets to their destination by utilizing the broadcast nature of wireless networks and selecting a set of nodes, instead of only one, as potential next-hop candidates. Apart from the reliability, security and trustworthiness of communications is also a challenging task. More specifically, almost all traditional and opportunistic routing protocols require cooperation of all network nodes to complete the routing process. However, some nodes in the network may be compromised and avoid collaboration with others due to various selfish or malicious motivations. The focus of this thesis is on modeling security challenges and developing trust-based opportunistic routing protocols. This way, communication between nodes will not only benefit from the reliability of opportunistic routing methods, but also from the security of trust and reputation management schemes. For this purpose, a novel trust-based opportunistic routing protocol is proposed that introduces three different candidate selection metrics known as RTOR, TORDP, and GEOTOR. Such metrics have been designed to address specific characteristics of opportunistic routing protocols. In continue, a watchdog mechanism is proposed to assist nodes in monitoring their candidates, recalculating their trust value, and finally replacing malicious candidates with benign ones. Afterwards, an analytical approach is introduced using Discrete-Time Markov Chain to demonstrate the effect of malicious nodes on different parameters of a wireless network that uses opportunistic routing. In this model, a new method of calculating packet drop ratio is introduced to represent the effect of attackers. The model is then applied on different well-known opportunistic routing protocols and results of the model are verified by simulation. Finally, the proposed analytical model is extended to include a defensive mechanism against adversary nodes. In fact, a packet salvaging mechanism is developed through which backup candidates attempt to save some of the maliciously dropped data packets. Different related network parameters such as delivery ratio, salvage ratio, direct-delivery ratio, etc. are then introduced, calculated, and reported using the introduced model.

Book Opportunistic Routing in Multihop Wireless Networks

Download or read book Opportunistic Routing in Multihop Wireless Networks written by Kai Zeng and published by . This book was released on 2008 with total page 402 pages. Available in PDF, EPUB and Kindle. Book excerpt: Abstract: Opportunistic routing (OR) takes advantages of the spatial diversity and broadcast nature of wireless networks to combat the time-varying links by involving multiple neighboring nodes (forwarding candidates) for each packet relay. This dissertation studies the properties, energy efficiency, capacity, throughput, protocol design and security issues about OR in multihop wireless networks. Firstly, we study geographic opportunistic routing (GOR), a variant of OR which makes use of nodes' location information. We identify and prove three important properties of GOR. The first one is on prioritizing the forwarding candidates according to their geographic advancements to the destination. The second one is on choosing the forwarding candidates based on their advancements and link qualities in order to maximize the expected packet advancement (EPA) with different number of forwarding candidates. The third one is on the concavity of the maximum EPA in respect to the number of forwarding candidates. We further propose a local metric, EPA per unit energy consumption, to tradeoff the routing performance and energy efficiency for GOR. Leveraging the proved properties of GOR, we propose two efficient algorithms to select and prioritize forwarding candidates to maximize the local metric. Secondly, capacity is a fundamental issue in multihop wireless networks. We propose a framework to compute the end-to-end throughput bound or capacity of OR in single/multirate systems given OR strategies (candidate selection and prioritization). Taking into account wireless interference and unique properties of OR, we propose a new method of constructing transmission conflict graphs, and we introduce the concept of concurrent transmission sets to allow the proper formulation of the maximum end-to-end throughput problem as a maximum-flow linear programming problem subject to the transmission conflict constraints. We also propose two OR metrics: expected medium time (EMT) and expected advancement rate (EAR), and the corresponding distributed and local rate and candidate set selection schemes, the Least Medium Time OR (LMTOR) and the Multirate Geographic OR (MGOR). We further extend our framework to compute the capacity of OR in multi-radio multi-channel systems with dynamic OR strategies. We study the necessary and sufficient conditions for the schedulability of a traffic demand vector associated with a transmitter to its forwarding candidates in a concurrent transmission set. We further propose an LP approach and a heuristic algorithm to obtain an opportunistic forwarding strategy scheduling that satisfies a traffic demand vector. Our methodology can be used to calculate the end-to-end throughput bound of OR in multi-radio/channel/rate multihop wireless networks, as well as to study the OR behaviors (such as candidate selection and prioritization) under different network configurations. Thirdly, protocol design of OR in a contention-based medium access environment is an important and challenging issue. In order to avoid duplication, we should ensure only the "best" receiver of each packet to forward it in an efficient way. We investigate the existing candidate coordination schemes and propose a "fast slotted acknowledgment" (FSA) to further improve the performance of OR by using a single ACK to coordinate the forwarding candidates with the help of the channel sensing technique. Furthermore, we study the throughput of GOR in multi-rate and single-rate systems. We introduce a framework to analyze the one-hop throughput of GOR, and provide a deeper insight on the trade-off between the benefit (packet advancement, bandwidth, and transmission reliability) and cost (medium time delay) associated with the node collaboration. We propose a local metric named expected one-hop throughput (EOT) to balance the benefit and cost. Finally, packet reception ratio (PRR) has been widely used as an indicator of the link quality in multihop wireless networks. Many routing protocols including OR in wireless networks depend on the PRR information to make routing decision. Providing accurate link quality measurement (LQM) is essential to ensure the right operation of these routing protocols. However, the existing LQM mechanisms are subject to malicious attacks, thus can not guarantee to provide correct link quality information. We analyze the security vulnerabilities in the existing link quality measurement (LQM) mechanisms and propose an efficient broadcast-based secure LQM (SLQM) mechanism, which prevents the malicious attackers from reporting a higher PRR than the actual one. We analyze the security strength and the cost of the proposed mechanism.

Book Opportunistic Routing and Network Coding in Multi hop Wireless Mesh Networks

Download or read book Opportunistic Routing and Network Coding in Multi hop Wireless Mesh Networks written by Chen Zhang and published by . This book was released on 2018 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The rapid advancements in communication and networking technologies boost the capacity of wireless networks. Multi-hop wireless networks are extremely exciting and rapidly developing areas and have been receiving an increasing amount of attention by researchers. Due to the limited transmission range of the nodes, end-to-end nodes may situate beyond direct radio transmission ranges. Intermediate nodes are required to forward data in order to enable the communication between nodes that are far apart. Routing in such networks is a critical issue. Opportunistic routing has been proposed to increase the network performance by utilizing the broadcast nature of wireless media. Unlike traditional routing, the forwarder in opportunistic routing broadcasts date packets before the selection of the next hop. Therefore, opportunistic routing can consider multiple downstream nodes as potential candidate nodes to forward data packets instead of using a dedicated next hop. Instead of simply forwarding received packets, network coding allows intermediate nodes to combine all received packets into one or more coded packets. It can further improve network throughput by increasing the transmission robustness and efficiency. In this dissertation, we will study the fundamental components, related issues and associated challenges about opportunistic routing and network coding in multi-hop wireless networks. Firstly, we focus on the performance analysis of opportunistic routing by the Discrete Time Markov Chain (DTMC). Our study demonstrates how to map packet transmissions in the network with state transitions in a Markov chain. We will consider pipelined data transfer and evaluate opportunistic routing in different wireless networks in terms of expected number of transmissions and time slots. Secondly, we will propose a regional forwarding schedule to optimize the coordination of opportunistic routing. In our coordination algorithm, the forwarding schedule is limited to the range of the transmitting node rather than among the entire set of forwarders. With such an algorithm, our proposal can increase the throughput by deeper pipelined transmissions. Thirdly, we will propose a mechanism to support TCP with opportunistic routing and network coding, which are rarely incorporated with TCP because the frequent occurrences of out-of-order arrivals in opportunistic routing and long decoding delay in network coding overpower TCP congestion control. Our solution completes the control feedback loop of TCP by creating a bridge between the sender and the receiver. The simulation result shows that our protocol significantly outperforms TCP/IP in terms of network throughput in different topologies of wireless networks.

Book Opportunistic Networks

Download or read book Opportunistic Networks written by Khaleel Ahmad and published by CRC Press. This book was released on 2018-10-03 with total page 314 pages. Available in PDF, EPUB and Kindle. Book excerpt: Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Book Routing for Wireless Multi Hop Networks

Download or read book Routing for Wireless Multi Hop Networks written by Sherin Abdel Hamid and published by Springer Science & Business Media. This book was released on 2013-01-18 with total page 81 pages. Available in PDF, EPUB and Kindle. Book excerpt: The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

Book Multihop Wireless Networks

Download or read book Multihop Wireless Networks written by Kai Zeng and published by John Wiley & Sons. This book was released on 2011-08-01 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol design, geographic opportunistic routing, opportunistic broadcasting, and security issues associated with opportunistic routing, etc. Furthermore, the authors discuss technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. The book brings together all the new results on this topic in a systematic, coherent and unified presentation and provides a much needed comprehensive introduction to this topic. Key Features: Addresses opportunistic routing, an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks Discusses the technological challenges lying behind this new technology, and covers a wide range of practical implementation issues Explores many fundamental research issues for this new concept, including the basic principles of opportunistic routing, performance limits and performance improvement, and compares them to traditional routing (e.g. energy efficiency and distributed opportunistic routing protocol design, broadcasting, and security issues) Covers technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. This book provides an invaluable reference for researchers working in the field of wireless networks and wireless communications, and Wireless professionals. Graduate students will also find this book of interest.

Book Proceedings of ICRIC 2019

Download or read book Proceedings of ICRIC 2019 written by Pradeep Kumar Singh and published by Springer Nature. This book was released on 2019-11-21 with total page 897 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents high-quality, original contributions (both theoretical and experimental) on software engineering, cloud computing, computer networks & internet technologies, artificial intelligence, information security, and database and distributed computing. It gathers papers presented at ICRIC 2019, the 2nd International Conference on Recent Innovations in Computing, which was held in Jammu, India, in March 2019. This conference series represents a targeted response to the growing need for research that reports on and assesses the practical implications of IoT and network technologies, AI and machine learning, cloud-based e-Learning and big data, security and privacy, image processing and computer vision, and next-generation computing technologies.

Book Multi rate multi range Routing Protocol for Multi hop Mobile Ad Hoc Networks

Download or read book Multi rate multi range Routing Protocol for Multi hop Mobile Ad Hoc Networks written by 陳仁暉 and published by . This book was released on 2002 with total page 92 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Rate Adaptive Opportunistic Routing in Multi hop Wireless Networks

Download or read book Rate Adaptive Opportunistic Routing in Multi hop Wireless Networks written by Shriniwas B. Kulkarni and published by . This book was released on 2008 with total page 124 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Opportunistic Routing in Multi hop Wireless Networks

Download or read book Opportunistic Routing in Multi hop Wireless Networks written by Sanjit Zubin Biswas and published by . This book was released on 2005 with total page 94 pages. Available in PDF, EPUB and Kindle. Book excerpt: (Cont.) An evaluation of an implementation on a 38-node 802.11b test-bed shows that ExOR improves bulk data transfer throughput for most node pairs when compared with unicast routing. For pairs between which unicast uses one or two hops, ExOR's robust batch maps prevent unnecessary retransmissions, increasing throughput by nearly 50%. For longer unicast routes, ExOR takes advantage of spatial diversity, providing gains of a factor of two to four when using a batch size of 10 packets.

Book MAC and Routing Protocols for Multi hop Wireless Networks

Download or read book MAC and Routing Protocols for Multi hop Wireless Networks written by Chih-Yuan Liao and published by . This book was released on 2004 with total page 51 pages. Available in PDF, EPUB and Kindle. Book excerpt: Abstract: "Wireless systems for industry have mostly used cellular-phone-style radio links, using point-to-point or point-to-multipoint transmission. Past research has indicated that these network architectures are not suitable for several industrial applications because of their rigid structure, meticulous planning requirements, and dropped signals. In contrast, wireless mesh networks are multi-hop systems in which devices assist each other in transmitting packets through the network, and they provide a reliable, flexible system that can be extended to thousands of devices. Some inherent advantages with mesh networks are scalability, non line-of-sight communications, high data rates, and low-cost deployment. Mesh networks have been deployed by MIT researchers and a few companies on a small scale. Mesh networks have not been deployed widely, in part because of some fundamental problems with the current protocols with regards to QoS support and scalability. To meet these requirements, the MAC protocol should be able to guarantee near constant capacity for networks of different sizes, and the routing protocol should perform admission control. Current CSMA-based MAC protocols have been shown to perform inadequately in terms of throughput and scalability in multi-hop deployments. The key problem with using protocols like IEEE 802.11 is that the link throughput is affected severely due to the exposed terminal problem, uncoordinated contentions, and wasteful backoffs. With the 802.11 MAC protocol, our results show that the capacity falls to about 1/10th for a chain and below 1/20th for a grid with horizontal constant bit rate flows. We have developed the WisperNet MAC and routing protocols, which provide end-to-end QoS guarantees over a multi-hop mesh network. By exploiting the topology information and the fact that fixed wireless nodes separated by 3 hops or more can transmit simultaneously, we eliminate collisions and maximize network utilization. The WisperNet routing protocol performs admission control. We show that the WisperNet MAC protocol can guarantee up to 9 times more capacity than IEEE 802.11, and this capacity remains nearly constant as the network grows. Also included is a performance analysis of different routing policies, and their effect on network utilization."

Book Routing and Efficient Evaluation Techniques for Multi hop Mobile Wireless Networks

Download or read book Routing and Efficient Evaluation Techniques for Multi hop Mobile Wireless Networks written by Young-Jun Lee and published by . This book was released on 2005 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: In this dissertation, routing protocols, load-balancing protocols, and efficient evaluation techniques for multi-hop mobile wireless networks are explored. With the advancements made in wireless communication and computer technologies, a new type of mobile wireless network, known as a mobile ad hoc network (MANET), has drawn constant attention. In recent years, several routing protocols for MANETs have been proposed. However, there still remains the need for mechanisms for better scalability support with respect to network size, traffic volume, and mobility. To address this issue, a new method for multi-hop routing in MANETs called Dynamic NIx-Vector Routing (DNVR) is proposed. DNVR has several distinct features compared to other existing on-demand routing protocols, which lead to more stable routes and better scalability. Currently, ad hoc routing protocols lack load-balancing capabilities. Therefore they often fail to provide good service quality, especially in the presence of a large volume of network traffic since the network load concentrates on some nodes, resulting in a highly congested environment. To address this issue, a novel load-balancing technique for ad hoc on-demand routing protocols is proposed. The new method is simple but very effective in achieving load balance and congestion alleviation. In addition, it operates in a completely distributed fashion. To evaluate and verify wireless network protocols effectively, especially to test their scalability properties, scalable and efficient network simulation methods are required. Usually simulation of such large-scale wireless networks needs a long execution time and requires a large amount of computing resources such as powerful CPUs and memory. Traditionally, to cope with this problem, parallel network simulation techniques with parallel computing capabilities have been considered. This dissertation explores a different type of method, which is efficient and can be achieved with a sequential simulation, as well as a parallel and distributed technique for large-scale mobile wireless networks.

Book On Opportunistic Cooperative Medium Access Control Protocols for Single hop and Multi hop IEEE 802 11 Based Wireless Networks

Download or read book On Opportunistic Cooperative Medium Access Control Protocols for Single hop and Multi hop IEEE 802 11 Based Wireless Networks written by Kumaran Vijayasankar and published by . This book was released on 2010 with total page 604 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cooperation is then applied to end-to-end multi-hop routes by using a relay if available for each hop along the end-to-end route. Performance improvements in terms of saturated throughput and end-to-end delay are evaluated for static predetermined routes. COBRA MAC is then combined with dynamic routing protocols like AODV and OLSR when a single transmission rate is used. Relay selection and performance improvements obtained under such conditions are then presented. Since, a typical IEEE 802.11 based network has multiple transmission rates, rate selection for the relay becomes important. Hence, heuristics to perform rate selection for relays are presented. Finally, a metric that jointly optimizes the end-to-end route and relay selection in a multi-hop network is proposed. Using analysis and simulations, it is shown that opportunistic cooperation provides noticeable performance improvements when applied to a multi-hop network.

Book Advanced Routing Protocols for Wireless Networks

Download or read book Advanced Routing Protocols for Wireless Networks written by Miguel Elias Mitre Campista and published by John Wiley & Sons. This book was released on 2014-06-02 with total page 149 pages. Available in PDF, EPUB and Kindle. Book excerpt: This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.