VOL. 2, NO. 3, March 2012 ISSN ARPN Journal of Systems and Software AJSS Journal. All rights reserved



Similar documents
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

IJMIE Volume 2, Issue 7 ISSN:

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Energy Consumption analysis under Random Mobility Model

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Energy Efficiency of Load Balancing in MANET Routing Protocols

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Location-Aided Routing (LAR) in mobile ad hoc networks

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Security in Ad Hoc Network

Study of Network Characteristics Incorporating Different Routing Protocols

Realistic Mobility for Mobile Ad Hoc Network Simulation

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Location Information Services in Mobile Ad Hoc Networks

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Security Threats in Mobile Ad Hoc Networks

Quality of Service Support in Mobile ad-hoc IP Networks *

Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

2. Related protocols. 1. Introduction

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Performance comparison and analysis of routing strategies in Mobile ad hoc networks

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network

An Efficient AODV-Based Algorithm for Small Area MANETS

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Internet Connectivity for Ad hoc Mobile Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Robust Routing in Wireless Ad Hoc Networks

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Load-Balanced Routing through Virtual Paths: Highly Adaptive and Efficient Routing Scheme for Ad Hoc Wireless Networks

SJBIT, Bangalore, KARNATAKA

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

Ad-Hoc Networking: A Unified Evaluation Framework

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna

Optimized Load Balancing Mechanism Using Carry Forward Distance

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Seamless Congestion Control over Wired and Wireless IEEE Networks

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Figure 1. The Example of ZigBee AODV Algorithm

A Novel Technique to Isolate and Detect Jamming Attack in MANET

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs


A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti

TOPOLOGIES NETWORK SECURITY SERVICES

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Road-Based Routing Protocol for Vanet Using Sumo and Move

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

other. A B AP wired network

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Adaptive DCF of MAC for VoIP services using IEEE networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

Transcription:

Performance Comparison and Improvement of Broadcasting Protocols in Mobile Ad-hoc Network 1 Md. Saifur Rahman, 2 Md. Bellal Hossain, 3 Md. Javed Hossain, 4 Mrinal Kanti Baowaly 1,2,3,4 Department of Computer Science and Telecommunication Engineering, Noakhali Science and Technology University, Noakhali-3814, Bangladesh. Email: { 1 iamsaif07@gmail.com, 2 belal.nstu@gmail.com, 3 javed_abc@yahoo.com, 4 baowaly@gmail.com} ABSTRACT Mobile Ad-hoc Network (MANET) is expected to be deployed in various scenarios having complex node mobility and connectivity dynamics in the future. Optimal in mobile Ad-hoc networking is crucial for providing control and routing information for multicast and point to point communication algorithms. In this paper presents an overview on the state of the art of techniques in mobile Ad-hoc networks, compare their performance and make recommendations to improve the efficiency performance of techniques. In this research work we have introduced the four different types of protocols, describe a clear concept of these protocols because we are going to work with these protocols. For this research work, we have used ns-2 simulator in Red Hat Linux environment successfully. We specially make comparison between simple flooding and probabilistic with 7 different probabilities by using two parameters which are average number of redundant and average number of single. For optimal power efficient we have analyzed the collected data and finally we have found that in probabilistic, the probability of approximately 0.275 is the best one. Keywords: MANET, simple flooding, probability based, area based and neighborhood based. 1. INTRODUCTION Wireless cellular systems have been in use since 1980s. We have seen their evolutions to first, second, third and now forth generation wireless systems. These systems work with the support of a centralized supporting structure such as an access point. The wireless users can be connected with the wireless system by the help of these access points when they roam from one place to the other place. The adaptability of wireless systems is limited by the presence of a fixed supporting coordinate. It means that the technology can not work efficiently in that places where there is no permanent infrastructure. Easy and fast deployment of wireless networks will be expected by the future generation wireless systems. This fast network deployment is not possible with the existing structure of present wireless systems. Recent advancements such as Bluetooth introduced a fresh type of wireless systems which is frequently known as mobile Ad-hoc networks. Mobile adhoc networks or "short live" networks control the nonexistence of permanent infrastructure. Mobile Ad-hoc network offers quick and horizontal network deployment in conditions where it is not possible. Otherwise Ad-hoc is a Latin word which means, "for this or for this only". 2. RELATED WORKS Ad-hoc network is very popular network. Broadcasting is a common operation in a network to resolve many issues. Particularly in a mobile ad hoc network (MANET), the host mobility operations are expected to be executed more frequently. Many research works have been done on Ad-hoc network, many also have been done on protocols. But about all of those were bounded in comparisons amon g different protocols depending on the analysis of the different performance parameters. The different researchers used different ones but not all at a time. These performance parameters are shown below. Data Packet Delivery Ratio Latency Packet loss Normalized routing load Throughput Protocol efficiency/ successful packets delivery (in percentage) Routing overhead But here we have worked with two new parameters. Average number of redundant Average number of single We have used these two parameters to make comparison between probabilistic with 7 different probabilities and simple flooding. We have also shown the comparison in Probabilistic using 7 different probabilities to suggest the best one. The work has been done in this field only by the center for reliable and high-performance computing (CRHC) [1]. But they published it as lab assignment named, lab108 only. There is no published paper on 104

result analysis or comparison of results or suggestion on results. 3. AD-HOC NETWORKS A mobile Ad-hoc network is a temporary network formed dynamically in an arbitrary manner by a collection of as need arises. 5. BROADCASTING Broadcasting is the transmission of datagram (packets) to all other in the network. Broadcasting is necessary in MANET routing protocols. For example, many unicast routing protocols such as Dynamic Source Routing (DSR), Ad-hoc on Demand Distance Vector (AODV), Zone Routing Protocol (ZRP) and Location Aided Routing (LAR) use. Figure1. Mobile Ad-hoc Network Typically, the membership of node group is dynamic that is node may join and leave group at any time. There is no restriction on the location or number of members in a node group. A node may be a member of more than one group at a time. A node does not have to be a member of a group to send packets to it. A node group may be permanent or transient. A permanent group has a well known administratively assigned address. It is the address but not the membership of the group that is permanent. At any time a permanent group may have any number of members even zero [2]. 4. ROUTING Routing means throughout or carry out of information from node to node. In an Ad-hoc network, routing is instead carried out by the participating themselves. Each node has the ability to forward traffic for others and this ability is what makes it possible for traffic to flow throw the Ad-hoc network over multiple hops. Unlike a stationary router in a conventional network, an Ad-hoc node does not need to be equipped with several network interfaces, since all communications are usually done through a single wireless channel [3]. 4.1 Categories of routing protocols Ad-hoc network uses different types of routing protocols to deliver data packets from source to destination. Some important types are shown below. Unicast (one to one/peer to peer) Multicast (one to many/many to many ) Broadcast (one to all) Geocast (send packet from source to all inside a region) Anycast (access nearest of any of receivers sharing the same service) In this research work, we have worked with routing protocols. Actually we are going to compare overall performance of different algorithms used in Ad-hoc network. 5.1 Broadcasting Methods Broadcasting methods have been categorized into four families utilizing the IEEE 802.11 MAC specifications [3] and [4]. Simple flooding [5] and [6]: Requires each node in a MANET to re all packets. Probability based [7]: Assigns probabilities to each node to re depending on the topology of the network. Area based [7]: Common transmission distance is assumed and a node will re if there is sufficient coverage area. Neighborhood based [8] and [9]: State on the neighborhood is maintained by neighborhood method, and the information obtained from the neighboring is used for re. 5.1.1 Simple Flooding Method Figure.2. O (n 2 ) number of messages in a simple flooding method In this method [5] and [6], a source node of a MANET transmits a message to all its neighbors. Each of these neighbors will check if they have seen this message before, if yes the message will be dropped, if no the message will be re-transmitted at once to all their neighbors. The process goes on until all have the message. A polynomial number of messages is of the magnitude (n 2 ) in a MANET of size n and is depicted in Fig. 2. Although this method is very reliable for a MANET with low density and high mobility but it is very harmful and unproductive as it causes severe network congestion and quickly exhaust the battery power. Blind flooding ensures the coverage, the packet is guaranteed to be received by every node in the network providing there is no packet loss caused by collision in the MAC layer and there is no high-speed movement of during the process. However, due to the nature of wireless communication media, 105

redundant transmissions in blind flooding may cause the storm problem [10], in which redundant packets cause contention and collision. 5.1.2 Probability Based Method The probability based approach tries to solve the problems of the simple flooding method. Each node i N is given a predetermined probability, pi for re. In this context, having some not to re and minimize the network congestion and collisions. In this approach there is a danger that some will not receive the message [7]. In dense networks, multiple share similar transmission coverage. Thus, randomly having some not re, they save node and network resources without harming delivery effectiveness. In sparse networks, there is much less shared coverage. Thus, won t receive all the packets with the probabilistic scheme unless the probability parameter is high. i Such that pi = 1, in another word probability is 100%. The probability based approach is reduced to a simple flooding approach. More efficient reduces pi, as the number of neighbor density increase and vise versa. 6. SIMULATION RESULTS WITH ANALYSES To attain goals of our research work we focus on a two part study. Each study is outlined in a subsection below. While our two studies vary some parameters, the ones outlined in Table 1, network parameters remain constant for all simulations. Table 1: Simulation parameters Parameter Simulator Routing Protocol used Protocol studied Simulation Time Value NS-2(Version-2.34) AODV Simple flooding, Probabilistic flooding (with 8 different probabilities) 10 sec Simulation Area 2500*2500 Transmission Range Interface queue type Antenna model Channel type 20m DropTail/ Pri Queue Omni Antenna Wireless Channel Radio-propagation Two Ray Ground mod el Network interface Wireless Phy type Max packet in 50 interface queue 400 Node Movement Model Traffic Type Random Way Point model CBR Packet size 256 Bandwidth 22.0e6(22.0 *1000000) Starting node 210 6.1 Parameter used for calculation Some common parameters are used for all study and analysis discussed below. Probability: Inputted by us as an argument in black shell of Red-Hat Linux when running pbcast_sim.tcl (command: ns pbcast_sim.tcl - prob 0.1/0.2/0.3/ /1.0 ) source node: Getting from trace file pbsim.tr, created after running pbcast_sim.tcl. This type of node is always starting with the following. s -t 0.000000000 -Hs 210 -Hd -2 -Ni 210 -Nx 1250.00 -Ny 1250.00 -Nz 0.0.. destination node: Getting from trace file pbsim.tr, created after running pbcast_sim.tcl. This type of node is always starting with the following. r -t 0.003232417 -Hs 209 -Hd -2 -Ni 209 -Nx 1250.00 -Ny 1125.00 -Nz 0.00 Total from Trace file: This indicates total including all. 6.1.1 Study 1 on probability vs. average number of : Two additional parameters are used for this calculative study. These are shown below. redundant : These can be calculated using following relation. redundant = Total - Source Average of redundant : These can be calculated using following relation. Average of redundant Broadcasting = Broadcasting / Destination 106

Table 2: Probability vs. average number of calculation Broadcasting name Probability Number of source destination Total (from Trace file) redundant (Total - Source ) Average number of redundant (Broadcasting / Destination ) Probabilistic 0.1 1 12 13 12 1,, 0.2 2 18 26 24 1.333333333,, 0.3 110 365 1180 1070 2.931506849,, 0.4 158 384 1618 1460 3.802083333,, 0.5 206 398 2031 1825 4.585427136,, 0.7 279 400 2476 2197 5.4925,, 0.9 364 400 3100 2736 6.84 Simple flooding 1.0 400 400 3443 3043 7.605 6.1.2 Analysis 1 on probability vs. average number of : From the calculation table 2, we have seen that increasing probability increases the redundancy in message. Besides, it also increases number of source, number of destination, total (including redundant s) and number of along with it. By analyzing the calculation table 2, we plot the graph given below in fig. 3, where only the values of probabilities and average number of are considered. In this graph, X-axis mention eight different points because here we are working with eight measurement values and Y-axis shown increases in probability and average number of individually in two different plotting lines. 6.1.3 Study 2 on probability vs. average number of single : Two additional parameters are used for this calculative study. These are shown below. single : These can be calculated using analyzing trace file very carefully. Average of single : These can be calculated using following relation. Average number of single Broadcasting = Single / Destination Figure.3.Probability vs. average number of. 6.1.4 Analysis 2 on probability vs. average number of single : From the calculation table 3, we have seen that increasing probability decreases the number of single message. Besides, it also increases number of source, number of destination, total (including redundant s) along with it. But from probabilities 0.7 to 1.0 there has no node with single. By analyzing the calculation table 3, we plot the graph given below in fig. 4, where only the values of probabilities and the average number of single are considered. In this graph X-axis mention eight different points and Y-axis shown increases in probability and decrease in average number of single individually in two different plotting lines. At points 6, 7 and 8 through the X-axis the average 107

number of single are zero which means there single is also approximately 0.275. So, in this is no single node, all node must have point both parameters obtain same value. redundant messages due to from their neighbors. From this graph we can analyze that when the probability is approximately 0.275, the average number of Table 3: Probability vs. average number of single calculation Broadcasting name Probability Number of source destination Total (from Trace file) single Average single (single /destination node) Probabilistic 0.1 1 12 13 12 1,, 0.2 2 18 26 10 0.5555555556,, 0.3 110 365 1180 37 0.101369863,, 0.4 158 384 1618 21 0.0546875,, 0.5 206 398 2031 6 0.0150753768 8,, 0.7 279 400 2476 0 0,, 0.9 364 400 3100 0 0 Simple flooding 1.0 400 400 3443 0 0 packet delivery time and also increase packet loss possibility etc. 7. DISCUSSIONS Fig. 4. Probability vs. average number of single. 7.1 Discussion 1 (from analysis 1) This causes an increase in power absorption but we know power assumption is a major problem in Ad-hoc network. Besides, increase in probability will cause the increase of congestion in channel bandwidth, increase 7.2 Discussion 2 (from analysis 2) Because less probability increases possibility to have node with no message, we should not apply with least probability although it makes highest performance in. Again probability from 0.7 to 1.0 has no single node with single message. So, we should use probability in between two. Analyses from Fig. 4, we can think that the Probability 0.275 will be optimal because it causes same value at both parameters. After this value probability increases but number of single decreases (i.e. redundant increases) and before this value, power absorption, channel bandwidth congestion and time to transmission is considered to be a major concern. So we think, this is the optimal power efficient among all of these at probability 0.275. 7.3 Discussion 3 7.3.1 Comparative discussion between simple flooding and probabilistic flooding From Table 2, we have seen that the number of source (400) and the number of destination (400) are same at probability 1.0. It means, at this probability all receive redundant. From this table we know that when 108

probability is 1.0, it becomes simple flooding. So, probabilistic flooding with any probability must be better than simple flooding. Simple flooding has highest average number of (7.605), so it is worsen than probabilistic flooding. Simple flooding has the number of single is zero, so it is worsen than probabilistic flooding. Simple flooding wastes channel bandwidth by increasing channel congestion. On the other hand probabilistic make lower channel congestion. Probabilistic reduces the storm problem when compare to simple flooding. 8. CONCLUSIONS The MANET is faced with the problem of energy efficiency in order to maximize the network lifetime. The goal of this research work is to explore energy efficient protocols in scenarios. From the analysis and discussion we can say that the probabilistic is better than simple flooding. Because It saves energy to increase network lifetime. It makes less channel congestion by and thus uses channel bandwidth efficiently. It decreases the of redundant messages and thus increases system performance. When probability is approximately 0.275, then the probabilistic will be the best in action. [2] Z. Haas and B. Liang, Ad hoc mobility management with randomized database groups, in Proceeding of the IEEE International Conference on Communications, p.1756-1762, 1999. [3] Wireless LAN Medium ACCESS CONTROL (MAC) and Physical Layer Specifications, IEEE Std. 802.11, New York, 1997. [4] B. Williams and T. Camp, Comparison of Broadcasting Techniques for Mobile Ad hoc Networks, in Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), p.194-205, 2002. [5] C. Ho, K. Obraczka, G. Tsudik and K. Viswanath, Flooding for Reliable Multicast in Multi-hop Ad hoc Networks, in International Workshop in Discrete Algorithms and Methods for Mobile Computing and Communication, p.64-71, 1999. [6] J. Jetcheva, Y. Hu, D. Maltz and D. Johnson, A Simple Protocol for Multicast and Broadcast in Mobile Ad hoc Networks, IETF MANET Working Group, Internet Draft, draft-ietf-manetsimple-mbcast-0l.txt, 2001. [7] S. Ni, Y. Tseng, Y. Chen and J. Sheu, The Broadcast Storm Problem in a Mobile Ad hoc Network, in International Workshop on Mobile Computing and Networks, p.151-162, 1999. 9. FUTURE WORK In this research study we have worked with two protocols. These are simple flooding and probabilistic with 7 different probabilities. We have shown the comparison between these two. So, we may extend this research work by adding another two protocols which we have mentioned earlier and compare all them with each other in future. REFERENCES [1] Distributed Algorithms and Wireless Network (DAWN) group website. [Online]. Available: http://www.crhc.illinois.edu/wireless/ assignments/simulations/lab108.html, 2002 [8] H. Lim and C. Kim, Multicast Tree Construction and Flooding in Wireless Ad-hoc Networks, in Proceedings of the ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM), p.61-68, 2000. [9] W. Peng and X. Lu, Efficient Broadcast in Mobile Ad hoc Networks, Journal of Computer Science and Technology, Vol.16, No.2, pp.114-125, 2001. [10] M. Gerla and J. T. Tsai, Multicluster, Mobile, Multimedia Radio Network, ACM-Baltzer Journal of Wireless Networks, 1(3), pp.255 265, 1995. 109