EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Time Division Multiple Access For Vehicular Communications

Download or read book Time Division Multiple Access For Vehicular Communications written by Hassan Aboubakr Omar and published by Springer. This book was released on 2014-09-02 with total page 73 pages. Available in PDF, EPUB and Kindle. Book excerpt: This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

Book Medium Access Control in Ad Hoc Networks with Omni directional and Directional Antennas

Download or read book Medium Access Control in Ad Hoc Networks with Omni directional and Directional Antennas written by Yu Wang and published by . This book was released on 2004 with total page 334 pages. Available in PDF, EPUB and Kindle. Book excerpt: An ad hoc network is a dynamic network formed on demand by a group of nodes without the aid of any pre-existing network infrastructure. An efficient and effective medium access control (MAC) protocol which regulates nodes access to the shared channel(s) is essential in an ad hoc network. Our work is focused on the throughput and fairness properties of existing omni-directional MAC protocols as well as enhancement of their performance with directional antennas via both analytical and simulation approaches. In the first part, we present the first analytical modeling of collision avoidance MAC protocols including the popular IEEE 802.11 MAC protocol in multi-hop ad hoc networks. We show that in ad hoc networks with a lot of hidden terminals, collision avoidance even if done correctly, can still limit achievable throughput significantly because of the much reduced spatial reuse. Then we advance the analytical modeling to evaluate those MAC protocols which use directional antennas and can achieve much higher throughput through directing transmissions and receptions to desired directions only. We show that the gain in spatial reuse outweighs that of collision avoidance and hence an aggressive all-directional scheme is more advantageous than other hybrid schemes that take conservative (or unnecessary) tradeoff between collision avoidance and spatial reuse. All the analytical work has provided very useful insight on the interaction between spatial reuse, interference reduction and collision avoidance that previous work lacked.

Book Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks

Download or read book Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks written by Lin Cai and published by . This book was released on 2009 with total page 169 pages. Available in PDF, EPUB and Kindle. Book excerpt: The next-generation wireless networks are expected to integrate diverse network architectures and various wireless access technologies to provide a robust solution for ubiquitous broadband wireless access, such as wireless local area networks (WLANs), Ultra-Wideband (UWB), and millimeter-wave (mmWave) based wireless personal area networks (WPANs), etc. To enhance the spectral efficiency and link reliability, smart antenna systems have been proposed as a promising candidate for future broadband access networks. To effectively exploit the increased capabilities of the emerging wireless networks, the different network characteristics and the underlying physical layer features need to be considered in the medium access control (MAC) design, which plays a critical role in providing efficient and fair resource sharing among multiple users. In this thesis, we comprehensively investigate the MAC design in both single- and multi-hop broadband wireless networks, with and without infrastructure support.

Book Heterogeneous Vehicular Networks

Download or read book Heterogeneous Vehicular Networks written by Kan Zheng and published by Springer. This book was released on 2016-03-18 with total page 93 pages. Available in PDF, EPUB and Kindle. Book excerpt: This brief examines recent developments in the Heterogeneous Vehicular NETworks (HETVNETs), integrating cellular networks with Dedicated Short-Range Communication (DSRC) for meeting the communications requirements of the Intelligent Transport System (ITS)services. Along with a review of recent literature, a unified framework of the HetVNET is presented. The brief focuses on introducing efficient MAC mechanisms for vehicular communications, including channel access protocols, broadcast/multicast protocols, the location-based channel congestion control scheme and the content-based resource allocation scheme. The cooperative communication between vehicles is discussed. This brief concludes with a discussion on future research directions, and provides the readers with useful insights into the future designs in the HetVNETs, to motivate new ideas for performance improvements in vehicular networks.

Book An Enhanced Medium Access Control Protocol for Ad Hoc Networks

Download or read book An Enhanced Medium Access Control Protocol for Ad Hoc Networks written by Priyadarshini Sabut and published by LAP Lambert Academic Publishing. This book was released on 2013 with total page 60 pages. Available in PDF, EPUB and Kindle. Book excerpt: Ad hoc Networks are the most popular networks and are useful in many application environments due to less cost and easy deployment at anytime anywhere. The efficiency of these networks depends on the performance and reliability of the medium access control (MAC) protocol applied in such networks. The IEEE 802.11 DCF MAC protocol for ad hoc networks suffers from the problem of bandwidth sharing due to presence of hidden and exposed nodes. This book discusses a MAC protocol that not only overcomes the problem of hidden and exposed nodes but also allows the hidden nodes to transmit and exposed nodes to receive without interfering with the ongoing transmission in their vicinity, thereby improving channel utilization. The proposed protocol outperforms IEEE 802.11 DCF MAC in terms of throughput and packet delivery ratio with a little cost of control overhead.

Book Internet of Things and Its Applications

Download or read book Internet of Things and Its Applications written by Sachi Nandan Mohanty and published by Springer Nature. This book was released on 2021-11-25 with total page 562 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book offers a holistic approach to the Internet of Things (IoT) model, covering both the technologies and their applications, focusing on uniquely identifiable objects and their virtual representations in an Internet-like structure. The authors add to the rapid growth in research on IoT communications and networks, confirming the scalability and broad reach of the core concepts. The book is filled with examples of innovative applications and real-world case studies. The authors also address the business, social, and legal aspects of the Internet of Things and explore the critical topics of security and privacy and their challenges for both individuals and organizations. The contributions are from international experts in academia, industry, and research.

Book On Cooperative Medium Access Control Protocols for IEEE 802 11 Based Wireless Ad Hoc Networks

Download or read book On Cooperative Medium Access Control Protocols for IEEE 802 11 Based Wireless Ad Hoc Networks written by Lakshmi Narasimhan Kannan and published by . This book was released on 2009 with total page 468 pages. Available in PDF, EPUB and Kindle. Book excerpt: Wireless transmission medium suffers from channel impairments like fading and path loss leading to performance degradations in terms of reduced throughput and increased latency. Medium access control protocols designed for wireless networking today provide multiple retransmissions as a way to account for frame losses caused by the channel. By retransmitting in the same channel, effectiveness of retransmissions can be reduced due to prolonged periods of channel impairments like obstacles in the line of sight of communication. Spatial diversity provides statistically different channels that can compensate for frame losses. Wireless medium being broadcast in nature paves way to achieve spatial diversity by asking neighboring nodes that can overhear transmissions to retransmit the frames. This procedure is termed cooperation. The nodes that help in successful communication between two other nodes are called relays. Medium access control protocols that are designed to account for cooperation are called cooperative medium access control protocols. This thesis presents one such cooperative protocol. The cooperative protocol presented in this thesis is unique in that the relays are opportunistic in nature. Relays here only help the source that is transmitting frames to a destination when a transmission failure occurs. A metric to find a suitable relay is presented and heurisitic algorithms to find transmission rate pairs for links in the cooperative setup are also presented. The thesis also shows that the cooperative protocol proposed can also be used in multi-hop networks. A cross layer routing metric to jointly perform route and relay selection in multi-hop networks is also presented. Simulation and analytical studies were carried out and results are presented in this thesis comparing the performance of the cooperative protocol presented here and the standard protocol it is based on. Performance improvements in terms of throughput and latency are brought about by using opportunistic cooperation. The performance improvements depend on careful selection of relays and transmission rates used for the links in the cooperative setup. The gains perceived in single hop networks were also seen in multi-hop networks but the magnitude of gains in multi-hop scenarios were dependent on network topology.

Book Computer Engineering and Networking

Download or read book Computer Engineering and Networking written by W. Eric Wong and published by Springer Science & Business Media. This book was released on 2014-02-03 with total page 1356 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book aims to examine innovation in the fields of computer engineering and networking. The book covers important emerging topics in computer engineering and networking, and it will help researchers and engineers improve their knowledge of state-of-art in related areas. The book presents papers from The Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) which was held on 20-21 July, in Shanghai, China.

Book Artificial Intelligence and Evolutionary Computations in Engineering Systems

Download or read book Artificial Intelligence and Evolutionary Computations in Engineering Systems written by Subhransu Sekhar Dash and published by Springer. This book was released on 2016-02-05 with total page 1319 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems (ICAIECES -2015) held at Velammal Engineering College (VEC), Chennai, India during 22 – 23 April 2015. The book discusses wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academic and industry present their original work and exchange ideas, information, techniques and applications in the field of Communication, Computing and Power Technologies.

Book Supporting Protocols for Structuring and Intelligent Information Dissemination in Vehicular Ad Hoc Networks

Download or read book Supporting Protocols for Structuring and Intelligent Information Dissemination in Vehicular Ad Hoc Networks written by Filip D. Cuckov and published by . This book was released on 2009 with total page 218 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Distributed Medium Access Control in Wireless Networks

Download or read book Distributed Medium Access Control in Wireless Networks written by Ping Wang and published by Springer Science & Business Media. This book was released on 2013-03-23 with total page 117 pages. Available in PDF, EPUB and Kindle. Book excerpt: This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network service provider for service class management. Also proposed is a novel busy-tone based distributed MAC scheme for wireless ad hoc networks and a collision-free MAC scheme for wireless mesh networks, respectively, taking the different network characteristics into consideration. The proposed schemes enhance the QoS provisioning capability to real-time traffic and, at the same time, significantly improve the system throughput and fairness performance for data traffic, as compared with the most popular IEEE 802.11 MAC scheme.

Book Medium Access Control and Adaptive Transmission Techniques in Wireless Networks

Download or read book Medium Access Control and Adaptive Transmission Techniques in Wireless Networks written by and published by . This book was released on 2005 with total page 368 pages. Available in PDF, EPUB and Kindle. Book excerpt: Efficient utilization of the limited wireless spectrum while satisfying applications' quality of service requirements is an essential design goal of forthcoming wireless networks and a key to their successful deployment. The need for spectrally efficient systems has motivated the development of adaptive transmission techniques. Enabling this adaptation requires protocols for information exchange as well as mathematical tools to optimize the controllable parameters. In this dissertation, we provide insights into such protocols and mathematical tools that target efficient utilization of the wireless spectrum. First, we propose a distributed CDMA-based medium access protocol for mobile ad hoc networks (MANETs). Our approach accounts for multiple access interference at the protocol level, thereby addressing the notorious near-far problem that undermines the throughput performance in MANETs. Second, we present a novel power-controlled MAC protocol, called POWMAC, which enjoys the same single-channel, single-transceiver design of the IEEE 802.11 Ad Hoc MAC protocol, but which achieves a significant throughput improvement over the 802.11 protocol. Third, we consider joint power/rate optimization in the context of orthogonal modulation (OM) and investigate the performance gains achieved through adaptation of the OM order using recently developed optimization techniques. We show that such adaptation can significantly increase network throughput while simultaneously reducing the per-bit energy consumption relative to fixed-order modulation systems. Finally, we determine the maximum achievable p̀̀erformance" of a wireless CDMA network that employs a conventional matched filter receiver and that operates under \emph{optimal} link-layer adaptation where each user individually achieves the Shannon capacity. The derived bounds serve as benchmarks against which adaptive CDMA systems can be compared.

Book Vehicular Networking

    Book Details:
  • Author : Christoph Sommer
  • Publisher : Cambridge University Press
  • Release : 2015
  • ISBN : 1107046718
  • Pages : 373 pages

Download or read book Vehicular Networking written by Christoph Sommer and published by Cambridge University Press. This book was released on 2015 with total page 373 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn about the basics and the future of vehicular networking research with this essential guide to in- and inter-vehicle communication.

Book Throughput and Fairness of Collision Avoidance Protocols in Ad Hoc Networks

Download or read book Throughput and Fairness of Collision Avoidance Protocols in Ad Hoc Networks written by and published by . This book was released on 2004 with total page 36 pages. Available in PDF, EPUB and Kindle. Book excerpt: Wireless ad hoc networks have received increasing interest in recent years because of their potential to be used in a variety of applications without the aid of any pre-existing network infrastructure. Due to the scarce channel bandwidth available in ad hoc networks, the design of efficient and effective medium access control (MAC) protocols that regulate nodes' access to a shared channel has become the subject of active research in recent years. Many MAC protocols have been proposed to mitigate the adverse effects of hidden terminals through collision avoidance. In Section 1, The authors present an analytical modeling to derive the saturation throughput of these sender-initiated collision avoidance protocols in multi-hop ad hoc networks with nodes randomly placed according to a two-dimensional Poisson distribution. They show that the sender-initiated collision-avoidance scheme achieves much higher throughput than the ideal CSMA scheme with a separate channel for acknowledgments. They also show that the collision-avoidance scheme can accommodate far fewer competing nodes within a region in a network infested with hidden terminals than in a fully connected network, if reasonable throughput is to be maintained. Simulations of the IEEE 802.11 MAC protocol and one of its variants validate the predictions made in the analysis. The simulation results also reveal the fairness problem in IEEE 802.11, which refers to the severe throughput degradation of some nodes due to their unfavorable locations in the network and the commonly used binary exponential backoff (BEB) algorithm that always favors the node that last succeeds. Section 2 introduce a framework to address the fairness problem and propose a topology-aware fair access (TAFA) scheme to realize the framework. Simulation results show that TAFA can solve the fairness problem in UDP-based applications with negligible degradation in throughput. Section 3 concludes this chapter with directions for future work.

Book Secure Routing and Medium Access Protocols in Wireless Multi hop Networks

Download or read book Secure Routing and Medium Access Protocols in Wireless Multi hop Networks written by Soufiene Djahel and published by GRIN Verlag. This book was released on 2011-12 with total page 173 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that

Book Intelligence in Communication Systems

Download or read book Intelligence in Communication Systems written by Roch Glitho and published by Springer. This book was released on 2006-02-25 with total page 317 pages. Available in PDF, EPUB and Kindle. Book excerpt: Communication systems are now ubiquitous and making them more intelligent remains very challenging. The IFIP International Conference on Intelligence in Communication Systems is an effort to bring together researchers and practitioners who represent the latest developments in this area. This volume contains selected papers from the conference in the following focus areas: ad hoc networks / hybrid networks / WLAN; security, privacy and consumer protection; adaptive architectures and protocols; flexible QoS and QoS management; flexible service specification, validation, searching and querying; service composition and Web services; personal, terminal and node mobility; programmable and active networks.