Author:
Publisher: CRC Press
Total Pages: 1142
Release:
Genre:
ISBN: 1135439621

Distributed Scheduling in Multihop Ad Hoc Networks

Distributed Scheduling in Multihop Ad Hoc Networks
Author: Yijiang Sun
Publisher: Open Dissertation Press
Total Pages:
Release: 2017-01-27
Genre:
ISBN: 9781361470701

This dissertation, "Distributed Scheduling in Multihop Ad Hoc Networks" by Yijiang, Sun, 孫一江, was obtained from The University of Hong Kong (Pokfulam, Hong Kong) and is being sold pursuant to Creative Commons: Attribution 3.0 Hong Kong License. The content of this dissertation has not been altered in any way. We have altered the formatting in order to facilitate the ease of printing and reading of the dissertation. All rights not granted by the above license are retained by the author. Abstract: Abstract of thesis entitled "Distributed Scheduling in Multihop Ad Hoc Networks" Submitted by Sun Yijiang for the degree of Master of Philosophy at The University of Hong Kong in February 2008 A multihop ad hoc network is a network formed by multiple nodes with- out the aid of any centralized administration, and data traffic is typically forwarded by multiple intermediate nodes before reaching its destination. In this thesis, we focus on improving QoS of end-to-end traffic flows in multihop ad hoc networks through packet transmission scheduling. Our approach was to design a framework in which existing schedul- ingalgorithmsoriginallydesigned forinfrastructure-basedwirelessnetworks could be adapted to multihop ad hoc networks. While infrastructure-based wireless scheduling has been studied extensively and most of the proposed algorithms handle the characteristics of wireless medium in an effective and fairway, ourapproach aimstogeneralizetheadaptationofthese algorithms to ad hoc networks and thus to make maximum use of the existing resource of wireless scheduling. iThe framework consists of two sets of mechanisms. The first one is an end-to-end service compensation mechanism. Each multihop flow is asso- ciated with some QoS requirement, which is requested and granted in the form of the desired service rate. The achieved rate is estimated at the des- tination and fed back to the source periodically. Both the desired rate and achieved rate of a multihop flow are propagated from the source node to all its downstream relaying nodes. With this information, a compensation- capable scheduling algorithm originally designed for infrastructure-based wireless networks can be adapted to each ad hoc node for error compensa- tion. The second part of the framework is a set of mechanisms for distributed opportunistic scheduling in multihop wireless ad hoc networks. The frame- work includes a wireless link state estimation mechanism, a requirement on medium access control protocol and two mechanisms to limit the access of the wireless medium. The link state estimation mechanism provides the necessary status of each wireless link and thus enables the adaptation of various opportunistic scheduling algorithms. The performance ofthe proposed framework was evaluated by computer simulations. Theresultsshowed thattheframeworkcaneffectivelycompen- sate flows that suffer sporadic burst channel errors in an end-to-end fashion and provides robust outcome fairness in the presence of channel errors. (Total number of words: 357) Signed Sun Yijiang ii DOI: 10.5353/th_b3955828 Subjects: Ad hoc networks (Computer networks) Computer algorithms

Position Location Techniques and Applications

Position Location Techniques and Applications
Author: David Munoz
Publisher: Academic Press
Total Pages: 297
Release: 2009-05-15
Genre: Technology & Engineering
ISBN: 0080921930

This book is the definitive guide to the techniques and applications of position location, covering both terrestrial and satellite systems. It gives all the techniques, theoretical models, and algorithms that engineers need to improve their current location schemes and to develop future location algorithms and systems. Comprehensive coverage is given to system design trade-offs, complexity issues, and the design of efficient positioning algorithms to enable the creation of high-performance location positioning systems. Traditional methods are also reexamined in the context of the challenges posed by reconfigurable and multihop networks. Applications discussed include wireless networks (WiFi, ZigBee, UMTS, and DVB networks), cognitive radio, sensor networks and multihop networks. Features Contains a complete guide to models, techniques, and applications of position location Includes applications to wireless networks, demonstrating the relevance of location positioning to these "hot" areas in research and development Covers system design trade-offs and the design of efficient positioning algorithms, enabling the creation of future location positioning systems Provides a theoretical underpinning for understanding current position location algorithms, giving researchers a foundation to develop future algorithms David Muñoz is Director and César Vargas is a member of the Center for Electronics and Telecommunications, Tecnológico de Monterrey, Mexico. Frantz Bouchereau is a senior communications software developer at The MathWorks Inc. in Natick, MA. Rogerio Enríquez-Caldera is at Instituto Nacional de Atrofisica, Optica y Electronica (INAOE), Puebla, Mexico. Contains a complete guide to models, techniques and applications of position location Includes applications to wireless networks (WiFi, ZigBee, DVB networks), cognitive radio, sensor networks and reconfigurable and multi-hop networks, demonstrating the relevance of location positioning to these ‘hot’ areas in research and development Covers system design trade-offs, and the design of efficient positioning algorithms enables the creation of future location positioning systems Provides a theoretical underpinning for understanding current position location algorithms, giving researchers a foundation to develop future algorithms

Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts

Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
Author: Cruz-Cunha, Maria Manuela
Publisher: IGI Global
Total Pages: 1584
Release: 2011-04-30
Genre: Social Science
ISBN: 1609600436

Discusses the main issues, challenges, opportunities, and trends related to this explosive range of new developments and applications, in constant evolution, and impacting every organization and society as a whole. This two volume handbook supports post-graduate students, teachers, and researchers, as well as IT professionals and managers.

Ad Hoc Networks

Ad Hoc Networks
Author: Nathalie Mitton
Publisher: Springer
Total Pages: 266
Release: 2015-09-24
Genre: Computers
ISBN: 3319250671

This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.

Computational Intelligent Security in Wireless Communications

Computational Intelligent Security in Wireless Communications
Author: Suhel Ahmed Khan
Publisher: CRC Press
Total Pages: 281
Release: 2022-09-21
Genre: Technology & Engineering
ISBN: 1000688992

Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book- Discusses computational algorithms for system modeling and optimization in security perspective. Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies. Explores a group of practical research problems where security experts can help develop new data-driven methodologies. Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

Distributed Dynamic Channel Access Scheduling for Ad Hoc Networks

Distributed Dynamic Channel Access Scheduling for Ad Hoc Networks
Author:
Publisher:
Total Pages: 35
Release: 2002
Genre:
ISBN:

Three types of collision-free channel access protocols for ad hoc networks are presented. These protocols are derived from a novel approach to contention resolution that allows contending entities to elect one or multiple winners for channel access in any given contention context (e.g., a time slot) in a distributed fashion. In multihop wireless networks, the only required information for each entity is the identifiers of its neighbors one and two hops away. The new protocols are shown to be fair and capable of achieving maximal utilization of the channel bandwidth. The delay and throughput characteristics of the contention resolution algorithms are analyzed, and the performance of the three types of channel access protocols is studied by simulations and compared with that of optimal static scheduling algorithms.