Routing Protocol for Mobile Ad-hoc Wireless Networks
|
|
|
- Kerry Ross
- 10 years ago
- Views:
Transcription
1 86 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS Routing Protocol for Mobile Ad-hoc Wireless Networks Ivris Marcelo BACARREZA NOGALES Dept. of Radio Electronics, Czech Technical University, Technická 2, Praha, Czech Republic Abstract. Bluetooth is a cutting-edge technology used for implementing wireless ad-hoc networks. In order to provide an overall scheme for mobile ad-hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad-hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad-hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks. piconets, but master only in one, and can transmit and receive data only in one piconet at a time, so participation in multiple piconets has to be on a time division multiplex basis. Keywords Bluetooth, mobile ad-hoc wireless networks, routing algorithm and performance. 1. Introduction The Bluetooth system operates in the worldwide unlicensed 2.4 GHz ISM frequency band [1]. To make the link robust to interference, it employs a Frequency Hopping Spread Spectrum technique, with carrier frequency changed at every packet transmission. To minimize complexity and to reduce the cost of the transceiver, it adopts a simple binary frequency shift keying modulation (Gaussian FSK), with a bit rate of 1 Mbps. Two or more Bluetooth units sharing the same channel form a piconet. Within a piconet a Bluetooth unit can have either of two roles: master or slave. Within each piconet there may be only one master and up to seven active slaves. Any Bluetooth unit can become a master in a piconet. Furthermore, two or more piconets can be interconnected, forming what is called a scatternet, Fig. 1. The connection point between two piconets consists of a Bluetooth unit that is a member of both piconets. A Bluetooth unit can simultaneously be a slave member of multiple Fig. 1. Scatternet formation. The Bluetooth system provides full-duplex transmission built on slotted time division duplex (TDD), where each slot is ms long. Master-to-slave transmissions always start in an even-numbered time slot, while slave-tomaster transmissions always start in an odd-numbered time slot. An even-numbered time slot and its subsequent oddnumbered time slot together are called a frame. There is no direct transmission between slaves in a Bluetooth piconet, only between a master and a slave, and vice versa. The communication within a piconet is organized such that the master polls each slave according to some polling scheme. A slave is only allowed to transmit immediately after the master has polled it. The slave will then start its transmission in the slave-to-master time slot following the packet received from the master. It is possible to send packets that cover multiple slots. These multi-slot packets may be either three or five slots long. Each Bluetooth unit has a globally unique 48-bit IEEE 802 address. This address is permanently assigned when the unit is manufactured. In addition to this, the master of a piconet assigns a local active member address (AM_ADDR) to each active member of the piconet. The AM_ADDR, which is only three bits long, is dynamically assigned and reassigned. The master uses the AM_ADDR when polling a slave in a piconet. Scatternets may be used
2 RADIOENGINEERING, VOL. 16, NO. 3, SEPTEMBER for a number of reasons. First, this is a way to extend the rather limited coverage that Bluetooth provides and reach beyond a single piconet. In addition, the line of sight behavior of the 2.4 GHz radio-wave may be improved if multihops between piconets are provided, allowing traffic paths around obstacles. Second, a scatternet may be the best solution to handle certain traffic and configuration patterns. For instance, when multiple Bluetooth PANs connect with a LAN through a Bluetooth LAN access point (LAP), the LAP is preferably chosen as the master. Since a node can be master of only one piconet, a simple architecture consists of connecting the remaining piconets to the "root" piconet in a tree-shaped scatternet. Third, the partitioning of a network into several scatternets may give an overall gain in capacity for the same area. For instance, if two slave nodes in different piconets have a sustained traffic requirement, it may be a better choice to create a new piconet containing only the two nodes. In fact, the FHSS access system to the channel makes Bluetooth very robust against interference. Therefore, new overlaid piconets gain substantially more capacity than is lost due to the increased interference between piconets. Bluetooth employs FHSS (Frequency Hopping Spread Spectrum) to avoid interference. There are 79 hopping frequencies (23 in some countries) each of them having a bandwidth of 1 MHz. Frequency hopping is combined with stop and wait ARQ (Automatic Repeat Request), CRC (Cyclic Redundancy Check), and FEC (Forward Error Correction) to achieve high reliability on the wireless links. For real-time data such as voice, Synchronous Connection Oriented (SCO) links are used, while for data transmission, Asynchronous Connectionless Link (ACL) links are used. There are several ACL packet types, differing in packet length and whether they are FEC coded or not. Tab. 1 shows the different ACL packet types and their properties. Mode FEC Size (bytes) Packet Length (slots) Symmetric Throughput (kbps) Asymmetric Throughput (kbps) DM1 Yes DM3 Yes DM5 Yes DM1 Yes DM3 Yes DM5 Yes Tab. 1. Different Bluetooth ACL connection modes. Previous algorithms that are proposed [5], [6], [7] lack the mobility support for ad-hoc wireless networks, and they can not excel in their ability to adjust and adapt to network changes. Examples include device failure, device out-of-range, or the arrival of additional devices. Our proposal allows for dynamic reconfiguration of the network topology at any time, and overcomes limitations of previous implementations. In our simulation experiments we have created a model that represents an ad-hoc network, capable to handle both kind of traffics asynchronous data communication and synchronous traffic as voice streaming. In this paper we will be interested only in the analysis of data flow throughput and delay measures, and in the behavior exhibited by the model. 2. Bluetooth Model A simple model has been devised which takes into consideration an environment consisting of a set of piconets. As can be seen from Fig. 1, interference is likely to occur between a set of piconets once the clock settings are not synchronized and, thus, packets from neighboring piconets overlap. This work gives special attention to this case; nevertheless it indicates the required changes in order to adapt it to the scatternet environment. To be able to carry out our analysis, we did some assumptions. A Bluetooth simulation model was developed as an extension to Network Simulator 2 (NS-2) [8]. The simulation model implements most of the features of the Bluetooth baseband layer like frequency hopping, time division duplexing, automatic retransmission query, multislot packets, fragmentation and reassembly of packets. In addition, we extended the capabilities of the simulator in order to be able to support Bluetooth scatternets by the implementation of Bluehoc [9]. Finally, as Bluehoc does not support mobility, we have modified the Bluetooth node structure and implemented soft handoff techniques to the model in order to achieve seamless mobile communication. Fig. 2 shows the overall architecture of a Bluetooth modified node, which shows us how new modules are integrated into the NS-2 framework, giving us the possibility to have nodes capable to act as master and slave simultaneously, something that in the basic model is not possible. Although a single Bluetooth stack is shown in the figure, a node can be configured to have multiple instances of the stack. Bluetooth AP node would be the case where the AP device needs to serve multiple Bluetooth nodes simultaneously. Tab. 2 describes the main stack components observed in the Bluetooth node structure. Our algorithm is implemented in Baseband and L2CAP layers, and is divided into three phases, Device Discovery, Network Formation, and Network Maintenance. The Baseband is a simple frame-to-packet layer which creates packets to be sent for radio transmission, or receives radio messages to be sent to higher layers. At the beginning each node in the network runs the same algorithm, and then when a device starts, the BTHost
3 88 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS shouts randomly the Host Controller Interface (HCI) which provides the convenient HCI_Inquiry or HCI_Write_Scan_Enables, that cause devices to enter to INQUIRY or INQUIRY SCAN, once the devices discover neighboring devices that are within range, a master-slave relationship is formed, then wait for the BASEBAND to accomplish communication among the nodes and then notify the BTAlgo according to befit matter (INQ_FINISH and PAGE_SCAN_FINISH). Then letting us know whether establish a connection with a distant device and decide to exchange data, or enter round procedures. Round procedures happen periodically, which find the links, and determine which ones have failed and which ones are alive. The routing protocol is an on-demand routing protocol that only discovers a new route when it is required, from this is clear that the protocol is more suited for mobile handheld devices as network bandwidth and battery power is limited, as is the case of Bluetooth technology. To find a route to the destination, the source broadcasts a route request packet (RRP), this message propagates through the network until it reaches an intermediate node that has recent route information about the destination. When intermediate nodes forwards the RRP, they record in their own tables which node the route request came from. This information is used to form a reply path for the route reply packet. All the nodes along the path enter the routing information in their tables. Whenever a link failure occurs, the source is notified and a route discovery can be requested again if necessary. Stack component Baseband BT_DRRScheduler LinkController LBF LMP L2CAP BTHost BTClassifier Responsibility of the item Implements basic operations of Bluetooth baseband Deficit Round Robin (DRR) based scheduler Stop and wait ARQ Leaky bucket filter Implements LMP commands: signaling and QoS operations Basic L2CAP functionality: SAR Host layered over L2CAP, controls device behavior. Classifies packets based on active mode address Tab. 2. Description of Bluetooth node components. Fig. 2. New Bluetooth node structure. The goal of the Inquiry process is for a master node to discover the existence of neighboring devices and to collect enough information about the low-level state of those neighbors (primarily related to their native clocks) to allow it to establish a frequency hopping connection with a subset of those neighbors. The goal of the page process is to use the information gathered in during the Inquiry process to establish a bi-directional frequency hopping communication channel. Bluetooth has a slotted MAC protocol, where master-slave and slave-master communications take turns. Packets can be one, three or five slots long. As result, the amount of allocation and throughput seen in the two directions and the total overhead depend on the asymmetry of traffic on a Bluetooth link. We have developed an analytical model for such a Bluetooth link. We assume that devices, from one or more piconets or a scatternet, are geographically distributed in a plane according to a Poisson process with λ stations/m² density. It is also assumed that a transmitting device is located at the centre of an imaginary hexagonal cluster and operates using an omni-directional antenna. For mathematical convenience, the hexagonal area is normalized to π and the clusters are approximated by circles of the unit radius. L2CAP avoids packet collision within a piconet, but lack of synchronization among independent neighboring piconets conduces to packet overlapping within a time slot. The transmission power P R, received by a receptor located at a distance r, is computed assuming a propagation model that takes into consideration signal attenuation, lognormal
4 RADIOENGINEERING, VOL. 16, NO. 3, SEPTEMBER shadowing due to surface irregularities, and a η-th power loss law, where the propagation loss exponent, η, is around 4. As a result, the received signal P R is given by: P R = α²e ξ Kr η P T where α² is an exponentially distributed random variable with unit mean, ξ is a Gaussian random variable with zero mean and variance σ², Kr -η refers to the power loss law, and P T represents the transmitted power. The same signal propagation model is assumed for all devices. Since the lognormal attenuation variable is given in dbs, the shadowing parameter, σ, is normally given in db as well. Please note that the notation σ = 0 means that the lognormal attenuation in db is Gaussian with a null variance, in other words it is constant. This work uses a capture model which assumes that a receiver may correctly detect and receive a signal with power P 0 if P P 0 i i > b where P i represents interference resulting from the i transmission of packets at the piconet i, and b represents the capture threshold. Since the ISM band is an open one, other interference caused by non-bluetooth devices is outside the scope of this study. slot. But the number of slaves would be limited to seven in this approach. Once network formation is completed, then information can start being transmitted in new topology. We ran a simple data flow scenario simulation. Fig. 3 shows the results of the experiments where 3 different size files, 100 Kbyte, 500 Kbyte, and 2.5 Mbyte, are transferred in 2 to 8 node piconet configurations. As shown ftp time increases significantly for a larger file, as the number of mobile nodes in the piconets increases. It is well matched to our expectation that the Bluetooth over-the-air link would be a bottleneck in an overloaded piconet. Ftp throughput averaging 3 different size experiments are shown in Fig. 4. The throughput reaches up to 640 kbps in 1-to-1 master-slave configuration, but it drops as multiple nodes contend to access the shared over-the-air channel. The maximum throughput is achieved after an initial ramping period of about 15 seconds. This is due to initial contention of the five mobile devices at the AP node. 3. Simulation Results In this section, we present simulation results of a simple scenario under a typical network configuration. In our scenario, a mobile node transfers a data flow to its server node on the network through an associated Bluetooth Access Point node. There are two possibilities by which an AP device and mobile devices determine their roles. Note that the AP device can act as the master or the slaves. First, the AP acts as the slave. When a mobile device comes in the range of the AP, it starts the page-inquiry procedure for a connection to the AP. These procedures form a new piconet where there are only two members. Consequently, the mobile device becomes a master device in the piconet. This approach brings time delay overhead taken by the AP node to switch among the different masters belonging to several unsynchronized piconets simultaneously. In contrast, an AP can play the master role and mobile devices would become slaves associated with it. In this approach, a new-coming device initiates a page-inquiry procedure as in the first approach. On connection to the AP, it requests master-slave role-reversal by LMP_switch_req. Then, the AP becomes the master and the mobile device is added to the group of slaves associated with the AP. This scheme enables the AP to control slave s access to the link, since only the slave addressed in the master-toslave slot is allowed to use the following slave-to-slave Fig. 3. Delay vs. Piconets when transferring different size files. Fig. 4. Throughput vs. Piconets at average rate. The proposed criteria lead to a good improvement in network performance. The results presented may be seen as a first attempt to design efficient mobile Bluetooth networks topologies, where several nodes attempt to transfer data when they are on the move. We will be working to find a mathematical framework that will allow us the design of a mobile ad-hoc routing protocol. 4. Conclusions In this paper, we presented a novel model for mobile ad-hoc routing protocol, which ensures efficient, seamless,
5 90 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS and provide support for users on the move. The extensions that were implemented in the Bluetooth model demonstrate the flexibility offered at lower layers of the Bluetooth stack. We have found that two characteristics, namely the amount of bridging overhead and the number of establishhed Bluetooth links, have a major impact on system performance. Namely, there is a link number where the through put is maximized. This implies that for good performance, it is fundamental to decrease bridging overhead as much as possible, and that the number of established Bluetooth links has to be well controlled by any scatternet formation protocol. There are still many challenges facing mobile ad-hoc wireless networks. However, because of their inherent advantages, wireless ad-hoc networks are becoming more and more prevalent in the world. Our next steps are directed to get better understanding of the full impact of Bluetooth technology on mobile adhoc wireless networks, by eliminating some simplifying assumptions that have been considered in the past, and to find the mathematical model mentioned in the previous section. References [1] Bluetooth SIG, Specification of the Bluetooth system, Core, Version 1.1. Bluetooth SIG Homepage: [2] LAW, CHING, SUI, KAI-YEUNG A Bluetooth scatternet formation algorithm. In Proc. IEEE GLOBECOM , vol. 5, pp [3] MISIC, V. B., MISIC, J. Minimizing end-to-end delays in Bluetooth scatternet with a slave/slave bridge. In Proc. 7th Intel. Conf. on Computer Communications and Networks, 2002, pp [4] SATO, T., MASE, K. A scatternet operation protocol for Bluetooth ad hoc networks. In 5th Intel. Symp. on Wireless Personal Multimedia Communications. 2002, vol. 1, pp [5] ZARUBA, G. V., BASAGNI, S., CHLAMTAC, I. Bluetrees scatternet formation to enable Bluetooth-based ad hoc networks. In Proc. IEEE International Conf. on Communications, ICC2001. June, 2001, vol. 1, pp [6] TAN, G., MIU, A., GUTTAG, J., BALAKRISHNAN, H. Forming scatternets from Bluetooth personal area networks. MIT Technical Report, no. MIT-LCS-TR-826, October [7] JOHANNSON, P., KAZANTZIDIS, M.; KAPOOR, R.; GERLA, M. Bluetooth: an enabler for personal area networking. Network, IEEE vol. 15, Issue 5, Sep/Oct 2001, pp Digital Object Identifier / [8] NS-2, Network Simulator ns-2, web page: [9] BlueHoc, IBM Project web page: www-124.ibm.com/developerworks/projects/bluehoc About Authors... Ivris Marcelo BACARREZA NOGALES was born in La Paz, Bolivia. He received the Bc. degree in 2001 and the M.Sc. degree in 2003, both in Computer Science and Engineering from the Czech Technical University in Prague. Actually he is a candidate for a Ph.D. degree at the same University. His research interest includes modeling and performance analysis of network protocols, media access control, and quality of service for IP and wireless network technologies. He received several international networking certifications as ITIL, CCNA, CCDA, CCNP, CCDP, CCIP, IP Communication specialist and Wireless specialist; and he is a member of the IEEE.
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Tecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Recent technological innovations and declining prices for personal computers (PCs) and
Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
New protocol concept for wireless MIDI connections via Bluetooth
Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
IEEE 802.15.1 Simulation and BER Analysis under the Interference
IEEE 802.15.1 Simulation and BER Analysis under the Interference Zahir Aalam, S Vhatkar, B. K. Mishra Thakur College of Engineering & Technology, Kandivali (E), Mumbai 101, M.S. India ABSTRACT There is
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
TDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: [email protected] Illsoo Sohn Email: [email protected] Kwang Bok Lee Email: [email protected] Abstract
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
Introduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
Electromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
SBrT 299. J = J 0 + ( D(i 1,i) J 0)
VI INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM (ITS2006), SEPTEMBER 3-6, 2006, FORTALEZA-CE, BRAZIL Evaluation of Wireless Links in a Hybrid Network Structure for Mobile VoIP Services D. F. S. Santos, J.
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Basic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Real-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
Bluetooth Tutorial. Dennis Sweeney Center for Wireless Telecommunications. [email protected]
Bluetooth Tutorial Dennis Sweeney Center for Wireless Telecommunications [email protected] Max Robert Mobile and Portable Radio Research Group DotMobile, Inc. [email protected] June 14, 2000 Overview
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
Device and Service Discovery in Bluetooth Networks
Master Thesis MEE 01-28 Device and Service Discovery in Bluetooth Networks & This thesis is presented as a part of the Master of Science degree in Electrical Engineering with emphasis on Telecommunication
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
Wireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
Narrowband and Broadband Access Technologies
Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya ([email protected])
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Forced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN [email protected]
