A New Hybrid Channel Access Scheme for Ad Hoc Networks

A New Hybrid Channel Access Scheme for Ad Hoc Networks
Author:
Publisher:
Total Pages: 6
Release: 2002
Genre:
ISBN:

Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated, according to the collision avoidance handshake in use. The sender-initiated scheme is adopted in the IEEE 802.11 Medium Access Control (MAC) protocol, which is by far the most popular and studied protocol. However, the IEEE 802.11 MAC protocol can experience serious fairness problems due to location-dependent contention and the binary exponential backoff it uses. On the other hand, a receiver-initiated collision avoidance handshake is more effective at the receiver's side. Hence, the authors propose a hybrid channel access scheme that combines both sender-initiated and receiver-initiated collision avoidance schemes. The new scheme involves only some additional queue management and book-keeping work while maintaining compatibility with the existing IEEE 802.11 protocol. Simulation experiments show that the new scheme is very effective, as it can achieve much better fairness than the original sender-initiated scheme with almost no degradation in throughput. The hybrid scheme also eliminates the need for a good traffic estimator, which is usually mandatory in pure receiver-initiated schemes.

Throughput and Fairness in A Hybrid Channel Access Scheme for Ad Hoc Networks

Throughput and Fairness in A Hybrid Channel Access Scheme for Ad Hoc Networks
Author:
Publisher:
Total Pages: 7
Release: 2003
Genre:
ISBN:

A novel hybrid channel access scheme that combines sender-initiated and receiver-initiated collision-avoidance handshakes is proposed for multi-hop ad hoc networks. The scheme is based on the observation that a receiver-initiated scheme is more appropriate when receivers are more knowledgeable of the contention around themselves and can compete for the channel more effectively. By adaptively sharing the burden of initiating the collision-avoidance handshake between the nodes that experience different levels of contention, better fairness may be achieved with almost no degradation in throughput. An attractive feature of the new scheme is that it is a simple extension to the existing IEEE 802.11 MAC protocol, and it maintains compatibility with the standard. The new scheme involves adding very simple queue management and book-keeping work mechanisms. Simulation experiments of the IEEE 802.11 MAC protocol and the new scheme show that, although the proposed hybrid scheme does not solve the fairness problem conclusively, it does alleviate the fairness problem in some cases without sacrificing much throughput and simplicity. The difficulty of improving fairness for TCP-based flows is demonstrated. A promising topic for future work consists of combining the new hybrid scheme with some proposed mechanisms that try to approximate fair queueing for ad hoc networks to achieve some QoS assurances. Without explicit information exchange among nodes, the fairness problem cannot be solved conclusively.

Hybrid Channel Access Scheduling in Ad Hoc Networks

Hybrid Channel Access Scheduling in Ad Hoc Networks
Author:
Publisher:
Total Pages: 13
Release: 2002
Genre:
ISBN:

We present the hybrid activation multiple access (HAMA) protocol for ad hoc networks. Unlike previous channel access scheduling protocols that activate either nodes or links only, HAMA is a node-activation channel access protocol that also maximizes the chance of link activations using time- and code-division schemes. HAMA only requires identifiers of the neighbors within two hops from each node to schedule channel access. Using this neighborhood information, each node determines whether to transmit in the current time slot on a dynamically assigned spreading code. A neighbor protocol supplements HAMA with up-to-date two-hop neighborhood information by reliably propagating the one-hop neighbor updates through a novel random access technique. The throughput and delay characteristics of HAMA in randomly-generated multihop wireless networks are studied by analyses and simulations. The results of the analyses show that HAMA achieves higher channel utilization in ad hoc networks than a distributed scheduling scheme based on node activation, similar throughout as a well-known scheduling algorithm based on complete topology information, and much higher throughout than the ideal CSMA and CSMA/CA protocols.

AD HOC NETWORKS

AD HOC NETWORKS
Author: Prasant Mohapatra
Publisher: Springer Science & Business Media
Total Pages: 287
Release: 2006-01-16
Genre: Technology & Engineering
ISBN: 0387226907

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area. AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks
Author: Jie Wu
Publisher: CRC Press
Total Pages: 896
Release: 2005-08-08
Genre: Computers
ISBN: 0203323688

The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network

Applied Informatics and Communication, Part II

Applied Informatics and Communication, Part II
Author: Dehuai Zeng
Publisher: Springer Science & Business Media
Total Pages: 758
Release: 2011-08-02
Genre: Computers
ISBN: 3642232191

The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks
Author: Hongyi Wu
Publisher: Nova Publishers
Total Pages: 662
Release: 2008
Genre: Computers
ISBN: 9781600219443

Wireless technologies and applications are becoming one of the fastest growing and most promising areas in recent years. To accommodate data transmission by multiple stations sharing the scarce wireless bandwidth, a medium access control (MAC) protocol plays a crucial role in scheduling packet transmission fairly and efficiently. The emerging wireless networks, such as ad-hoc networks, sensor networks or mesh networks, are mostly multi-hop based and in distributed manner, which brings a lot of problems and challenges in designing fine-tuned MAC protocols tailored for modern wireless network. In this book, the authors give complete and in-depth overviews to the classic medium access control algorithms and the related protocols, as well as their applications in various wireless data networks especially the most successful Wireless Local Area Networks (WLAN). The book consists of three major parts. Part I of this book, including Chapters 1-7, is emphasising on the fundamentals of medium access control algorithms and protocols. Chapter 1 provides an introduction to the wireless networks, such as overview of wireless networks, problems and challenges of the wireless networks, and the classifications of MAC protocols as well as the performance metrics. Chapter 2 introduces important collision resolution algorithms applied in medium access controls, for example, the splitting algorithm and the backoff algorithm. Chapter 3 reviews the hybrid access control algorithms that combine both contention and allocation schemes. A series of important collision avoidance schemes are introduced in Chapters 4-7 respectively, with a specific design goal covered in each chapter. Chapter 4 focuses on the multi-channel MAC protocols for collision avoidance; Chapter 5 introduces the concepts of power control and power management in medium access control and how they can be applied in MAC protocol design; Chapter 6 presents how to provide Quality-of- Service (QoS) to multimedia wireless networks, in either centralised or distributed manner; and Chapter 7 explains how the smart antennas can be applied in the medium access control to provide high channel throughput and low packet collision.

Medium Access Control in Ad Hoc Networks with Omni-directional and Directional Antennas

Medium Access Control in Ad Hoc Networks with Omni-directional and Directional Antennas
Author: Yu Wang
Publisher:
Total Pages: 334
Release: 2004
Genre: Computer network protocols
ISBN:

An ad hoc network is a dynamic network formed on demand by a group of nodes without the aid of any pre-existing network infrastructure. An efficient and effective medium access control (MAC) protocol which regulates nodes access to the shared channel(s) is essential in an ad hoc network. Our work is focused on the throughput and fairness properties of existing omni-directional MAC protocols as well as enhancement of their performance with directional antennas via both analytical and simulation approaches. In the first part, we present the first analytical modeling of collision avoidance MAC protocols including the popular IEEE 802.11 MAC protocol in multi-hop ad hoc networks. We show that in ad hoc networks with a lot of hidden terminals, collision avoidance even if done correctly, can still limit achievable throughput significantly because of the much reduced spatial reuse. Then we advance the analytical modeling to evaluate those MAC protocols which use directional antennas and can achieve much higher throughput through directing transmissions and receptions to desired directions only. We show that the gain in spatial reuse outweighs that of collision avoidance and hence an aggressive all-directional scheme is more advantageous than other hybrid schemes that take conservative (or unnecessary) tradeoff between collision avoidance and spatial reuse. All the analytical work has provided very useful insight on the interaction between spatial reuse, interference reduction and collision avoidance that previous work lacked.

Universal Multiservice Networks

Universal Multiservice Networks
Author: Mário Marques Freire
Publisher: Springer
Total Pages: 567
Release: 2011-04-06
Genre: Computers
ISBN: 3540301976

On behalf of the Organizing and Program Committees of the 3rd European Conference on Universal Multiservice Networks (ECUMN 2004), it is our great pleasure to introduce the proceedings of ECUMN 2004, which was held during October 25–27, 2004, in Porto, Portugal. In response to the Call for Papers, a total of 131 papers were submitted from 29 countries. Each paper was reviewed by several members of the Technical Program Committee or by external peer reviewers. After careful assessment of thereviews,53paperswereacceptedforpresentationin13technicalsessions;half of them originated from countries outside Europe (mainly Asia). This illustrates the strong interest of this conference beyond its original geographical area. The conference program covered a variety of leading-edge research topics which are of current interest, such as wireless networks, mobile ad hoc networks, sensor networks, mobility management, optical networks, quality of service and tra?c, transport protocols, real-time and multimedia, Internet technologies and applications, overlay and virtual private networks, security and privacy, and network operations and management. Together with three plenary sessions from France T ́ el ́ ecom, Siemens, and Cisco Systems, these technical presentations - dressed the latest research results from the international industry and academia and reported on ?ndings on present and future multiservice networks.

Advanced Wireless Networks

Advanced Wireless Networks
Author: Savo Glisic
Publisher: John Wiley & Sons
Total Pages: 892
Release: 2009-04-27
Genre: Technology & Engineering
ISBN: 9780470745731

With 40% new material the new edition of Advanced Wireless Networks provides a comprehensive representation of the key issues in 4G wireless networks. Focussing on cognitive, cooperative and opportunistic paradigms to provide further increase in network efficiency, the book explores and addresses issues in wireless internet, mobile cellular and WLAN, as well as sensor, ad hoc, bio-inspired, active and cognitive networks. It examines the problem of cross-layer optimisation and network information theory as well as adaptability and reconfigurability in wireless networks. This book is an integral description of future wireless networks and the interconnection between their elements. The information is presented in a logical order within each chapter making it ideal for all levels of reader including researchers involved in modelling and analysis of future networks as well as engineers working in the area. Each chapter starts with introductory material and gradually includes more sophisticated models and mathematical tools concluding with a comprehensive list of references. Fully updated throughout with five new chapters on Opportunistic Communications; Relaying and Mesh Networks; Topology Control; Network Optimization; and Cognitive Radio Resource Management Unifies the latest research on cognitive, cooperative and opportunistic paradigms in wireless communications Provides efficient analytical tools for network analysis Discusses security issues, an essential element of working with wireless networks Supports advanced university and training courses in the field Companion website containing extra appendix on Queuing theory