TITLE

Evaluation of Physical Carrier Sense Based Backbone Maintenance in Mobile Ad Hoc Networks

AUTHOR(S)
Deval, Sapna; Ritchie, Luke; Reisslein, Martin; Richa, Andrea W.
PUB. DATE
January 2009
SOURCE
International Journal of Vehicular Technology;2009, Vol. 2009, Special section p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Physical carrier sensing has to date mainly been exploited for improving medium access control in wireless networks. Recently, a parallel algorithm striving to extensively exploit physical carrier sensing for constructing andmaintaining a connected dominating set (CDS), which is also known as spanner, backbone, or overlay network in wireless ad hoc networks with interference ranges larger than transmission ranges has been proposed. Existing evaluations of this algorithm are limited to theoretical asymptotic bounds and simulations of static networks. In this paper, we evaluate the physical carrier sensing-based CDS maintenance for mobile ad hoc networks through discrete event simulations. For a wide range of node speeds and node densities, we evaluate the CDS characteristics andmessage exchanges required formaintaining the CDS.We find that the algorithm maintains a stable leader set dominating all nodes in the network for a wide range of mobility levels but struggles to maintain connectivity at high mobility levels. We also quantify the portions of the control messages for CDS maintenance that are exchanged through physical carrier sensing. We find that the parallel algorithm manages to greatly reduce the reliance on intact message receptions.
ACCESSION #
55361568

 

Related Articles

  • LVAP: Lightweight V2I authentication protocol using group communication in VANETs. Liu, Yining; Guo, Wei; Zhong, Qi; Yao, Gang // International Journal of Communication Systems;Nov2017, Vol. 30 Issue 16, p1 

    The authentication protocol is vital for the security of the wireless sensor network to resist the known threats, such as eavesdropping, replay attack, man-in-the-middle attack, etc. In this paper, a lightweight authentication protocol for vehicular ad hoc networks is proposed using the...

  • Misbehavior analysis of IEEE 802.11 MAC layer in mobile ad hoc network using stochastic reward nets. Yadollahzadeh Tabari, Meisam; Pouyan, Ali A. // International Journal of Communication Systems;Nov2017, Vol. 30 Issue 16, p1 

    In this paper, we present a Petri net model for performance evaluation of IEEE 802.11 distributed coordination function as a popular media access control layer protocol in mobile ad hoc network. The goal of this evaluation is to examine this protocol under the existing of misbehavior nodes that...

  • Android smartphones network implementation in the absence of internet. El‐Bayaa, Ahmed S.; Khedr, Mohamed E.; Aly, Moustafa H. // Computer Applications in Engineering Education;Jul2018, Vol. 26 Issue 4, p938 

    Abstract: In this paper, Mobile Delay Tolerant Network service is implemented in Android application that allows the use of smartphones for broadcasting messages to nearby smartphones without Internet. A simple experiment is carried out with simple facilities and one type of routing protocols....

  • Improved Topology Control Algorithm for MANETs. Hamad, Hatem // AIP Conference Proceedings;6/12/2008, Vol. 1019 Issue 1, p460 

    A mobile wireless ad hoc network is formed dynamically without a need for a pre-existing infrastructure. Frequent Topology changes leads to more processing and hence more power consumption. Reducing power consumption during node's life time is a challenging task. Adaptive Self-Configuring sEnsor...

  • Wireless and mobile network performance evaluation. Notare, Mirela Sechi Moretti Annoni // Concurrency & Computation: Practice & Experience;Apr2016, Vol. 28 Issue 6, p1767 

    No abstract available.

  • Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking. Kuai, Meng; Hong, Xiaoyan // Future Internet;Jun2019, Vol. 11 Issue 6, p139 

    The emerging connected and autonomous vehicles (CAVs) challenge ad hoc wireless multi-hop communications by mobility, large-scale, new data acquisition and computing patterns. The Named Data Networking (NDN) is suitable for such vehicle ad hoc networks due to its information centric networking...

  • Enabling connectivity for tactical networks in mountainous areas by aerial relays. Al-Shehri, Salman M.; Loskot, Pavel; Hirsch, Michael J. // Telecommunication Systems;Aug2019, Vol. 71 Issue 4, p561 

    A general modeling framework for realistic performance evaluations of tactical mobile ad-hoc networks deployed in mountainous areas is presented. The framework is easily extensible, and can be eventually automated. It can be also used to generate data for other network simulators. The framework...

  • Editorial for QShine 2008. Zhang, Qian; Hossain, Ekram // Mobile Networks & Applications;Apr2009, Vol. 14 Issue 2, p121 

    The article discusses various reports published within the issue, including one by Yang and colleagues on the routing optimization problem in wireless mesh networks, one by Hany and colleagues on the proposed super node system architecture to achieve the connectivity over interconnected wireless...

  • Provide wireless technology. Swanson, Lisa // Credit Union Magazine;Sep2000, Vol. 66 Issue 9, p46 

    Focuses on the emergence of wireless phones in the United States that provide access to the World Wide Web. Number of wireless phone subscribers in the country; Common traits among Internet access devices; Challenge of the condition for credit unions.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics