Filters








1,009 Hits in 9.1 sec

A Distributed Protocol for the Bounded-Hops Converge-Cast in Ad-Hoc Networks [chapter]

Andrea E. F. Clementi, Miriam Di Ianni, Massimo Lauria, Angelo Monti, Gianluca Rossi, Riccardo Silvestri
2006 Lecture Notes in Computer Science  
Euclidean space and a root b ∈ S, the h-hops Convergecast problem asks to find for a minimal energy-cost range assignment which allows to perform the converge-cast primitive (i.e. node accumulation) towards  ...  In particular, we introduce an efficient parameterized randomized protocol for h-hops Convergecast and we analyze it on random instances created by placing n points uniformly at random in a d-cube of side  ...  Distributed Protocol for the Ad-Hoc Model We consider h-hops Convergecast on the ad-hoc model and we propose a distributed randomized protocol h-Prot that, given a set S and a root b, constructs a feasible  ... 
doi:10.1007/11814764_7 fatcat:33nywpy4lfhzza2tbuido65fmy

Validation of Wireless Sensor Networks with Cross-Layer Properties

Vemula Harini, Barupati Sampath
2013 International Journal of Computer Applications  
This framework is generic and can be parameterized for a wide variety of MAC protocols and routing protocols.  ...  In the original OSI networking model, data are kept strictly within a given layer because strict boundaries between layers are enforced.  ...  The authors would like to thank the Vardhaman college of engineering for its support with their excellent lab facilities.  ... 
doi:10.5120/13529-1276 fatcat:xwrxeltshzfcxgd3itcfgsmk5y

Converge Cast: On the Capacity and Delay Tradeoffs

Xinbing Wang, Luoyi Fu, Xiaohua Tian, Yuanzhe Bei, Qiuyu Peng, Xiaoying Gan, Hui Yu, Jing Liu
2012 IEEE Transactions on Mobile Computing  
In this paper, we define an ad hoc network where multiple sources transmit packets to one destination as Converge-Cast network.  ...  Then node mobility is introduced to increase network capacity, for which our study is performed in two steps. The first step is to establish the delay in single-session transmission.  ...  ACKNOWLEDGMENT We deeply appreciate the valuable and constructive comments from the anonymous reviewers, and editor.  ... 
doi:10.1109/tmc.2011.110 fatcat:sffdi7x4mfcohf2xmw6rjfkv3m

Fundamental Limits of Information Dissemination in Wireless Ad Hoc Networks

Zheng Wang, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves
2011 IEEE Transactions on Wireless Communications  
We show that Θ ( ( ) √ / ), Θ (1/ ), and Θ ( 2 ( ) ) bits per second constitute a tight bound for the throughput capacity of random wireless ad hoc networks under the protocol model when = ( −2 ( ) ) ,  ...  We show that the use of MPR can lead to both increased network capacity and reduced delays in wireless ad hoc networks.  ...  " Transmitters Receivers ( ) = ( ) = Ω ( √ (log )/ ) . (1) We assume a random wireless ad hoc network with nodes distributed uniformly in the network where the area of the network is a square of unit  ... 
doi:10.1109/twc.2011.011211.100007 fatcat:ffyen3zt5ndhxeqauuf5mtuptm

Self-stabilizing multicast protocols for ad hoc networks

Sandeep K.S. Gupta, Pradip K Srimani
2003 Journal of Parallel and Distributed Computing  
We propose two distributed algorithms to maintain respectively the minimum weight spanning tree (MST) based multi-cast tree and the shortest path (SPST) multi-cast tree in a given ad hoc network for a  ...  In any ad hoc network, the participating nodes periodically transmit beacon messages for message transmission as well as to maintain the knowledge of the local topology at the node; as a result the nodes  ...  The authors wish to thank the anonymous reviewers for many helpful comments that improved the presentation of the paper.  ... 
doi:10.1016/s0743-7315(02)00029-1 fatcat:xpf7lc2yovaczn5yg64nxjyh6y

Capacity scaling laws of information dissemination modalities in wireless ad hoc networks

Zheng Wang, Hamid R. Sadjadpour, J.J. Garcia-Luna-Aceves
2008 2008 46th Annual Allerton Conference on Communication, Control, and Computing  
We show that Θ (T (n) √ m/k), Θ (1/k), and Θ T 2 (n) bits per second constitute a tight bound for the throughput capacity of random wireless ad hoc networks under the protocol model respectively.  ...  Information dissemination modalities are modeled with an (n, m, k)-cast formulation, where n, m, and k denote the number of nodes in the network, the number of destinations for each communication group  ...  NETWORK MODEL AND PRELIMINARIES We assume a random wireless ad hoc network with n nodes distributed uniformly in a network of unit square area.  ... 
doi:10.1109/allerton.2008.4797692 fatcat:3zivpifmifhfdnyrilkwll5k2y

Capacity-delay tradeoff for information dissemination modalities in wireless networks

Zheng Wang, Hamid R. Sadjadpour, J.J. Garcia-Luna-Aceves
2008 2008 IEEE International Symposium on Information Theory  
This paper presents the first comprehensive capacity-delay tradeoff study for random wireless ad hoc networks under all information dissemination modalities (unicast, multicast, broadcast, anycast) when  ...  Our results demonstrate that for unicast, increasing capacity requires additional delay for SPR similar to the results in [1] while MPR incurs no penalty, i.e., we can increase capacity and decrease delay  ...  Lower Bound To derive an achievable lower bound, we use a TDMA scheme for random dense wireless ad hoc networks similar to the approach used in [9] .  ... 
doi:10.1109/isit.2008.4595072 dblp:conf/isit/WangSG08 fatcat:ovexb6irdrhenb7r4maaau2iou

Progressive Decentralized TDMA Based MAC: Joint Optimization of Slot Allocation and Frame Lengths

Muhammad Hafeez Chaudhary, Bart Scheers
2013 MILCOM 2013 - 2013 IEEE Military Communications Conference  
Besides, we provide upper bound on the convergence time of the algorithm for a single node, and for the whole network.  ...  The TDMA based MAC scheduling is considered appropriate for many applications in which deterministic medium access schedule plays a crucial role.  ...  For ad hoc networks, distributed versions of RAND (named DRAND) and MNF (named HUDSAP) are proposed in [6] and [10] , respectively.  ... 
doi:10.1109/milcom.2013.40 dblp:conf/milcom/ChaudharyS13 fatcat:62vrkiqo4feljd7ml3regkydzy

Study And Analysis Of A Routing In Vehicular Ad Hoc Networks

Gujju Vijaya Padma*, Gadde Sridevi
2016 Zenodo  
It is the Integrated ad hoc network for Wireless LAN (WLAN) and Cellular Technology.  ...  These characteristics can be achieved only by the special network technology that is Vehicular Ad Hoc Network(VANET).  ...  These routing protocols,(AODV and DSR) are designed for the general purpose ad hoc networks for mobile nodes and they do not maintain the routes unless in necessary conditions.  ... 
doi:10.5281/zenodo.57986 fatcat:sdac5eq4vrd6ppem3tcubrmhjq

A Unifying Perspective on the Capacity of Wireless Ad Hoc Networks

Z. Wang, H. R. Sadjadpour, J. J. Garcia-Luna-Aceves
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
We compute upper and lower bounds for the (n, m, k)cast throughput capacity in random wireless networks.  ...  We present the first unified modeling framework for the computation of the throughput capacity of random wireless ad hoc networks in which information is disseminated by means of unicast routing, multicast  ...  ad hoc networks.  ... 
doi:10.1109/infocom.2008.51 dblp:conf/infocom/WangSG08 fatcat:o7bbzugfercttp4bjpge4vavfq

A Unifying Perspective on the Capacity of Wireless Ad Hoc Networks

Z. Wang, H. R. Sadjadpour, J. J. Garcia-Luna-Aceves
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
We compute upper and lower bounds for the (n, m, k)cast throughput capacity in random wireless networks.  ...  We present the first unified modeling framework for the computation of the throughput capacity of random wireless ad hoc networks in which information is disseminated by means of unicast routing, multicast  ...  ad hoc networks.  ... 
doi:10.1109/infocom.2007.51 fatcat:4hjhdfxunvc37bcifryb3zl4xa

Spontaneous, Self-Sampling Quorum Systems for Ad Hoc Networks

Kishori M. Konwar, Peter M. Musial, Alexander A. Shvartsman
2008 2008 International Symposium on Parallel and Distributed Computing  
A hybrid ad-hoc network uses a combination of base stations and multi-hop data forwarding.  ...  Ad hoc networks provide a dynamic infrastructure, such as the ones commonly used in sensor network applications, that can be quickly deployed in a geographic region of interest [2] for reasons such as  ...  We analyzed the communication bounds for a commonly used multi-hop ad hoc network, where both client-to-nodes and nodes-to-client communication is carried out in a multi-hop fashion.  ... 
doi:10.1109/ispdc.2008.61 dblp:conf/ispdc/KonwarMS08 fatcat:3cgw3cbc5ngcbnhy2ulg3ggy5m

A Synchronous Self-stabilizing Minimal Domination Protocol in an Arbitrary Network Graph [chapter]

Z. Xu, S. T. Hedetniemi, W. Goddard, P. K. Srimani
2003 Lecture Notes in Computer Science  
In this paper we propose a new self-stabilizing distributed algorithm for minimal domination protocol in an arbitrary network graph using the synchronous model; the proposed protocol is general in the  ...  sense that it can stabilize with every possible minimal dominating set of the graph.  ...  In this paper we propose a distributed algorithm to maintain a minimal dominating set in an arbitrary ad hoc network.  ... 
doi:10.1007/978-3-540-24604-6_3 fatcat:cookbegrgffo5cd233kjpxbhxm

Throughput Scaling of Wireless Networks With Random Connections

Shengshan Cui, Alexander M Haimovich, Oren Somekh, H Vincent Poor, Shlomo Shamai
2010 IEEE Transactions on Information Theory  
This work studies the throughput scaling laws of ad hoc wireless networks in the limit of a large number of nodes.  ...  The following results are proven: 1) for a class of connection models with finite mean and variance, the throughput scaling is upper-bounded by ( 1 3 ) for single-hop schemes, and ( 1 2 ) for two-hop (  ...  Berry and the anonymous reviewers for their thoughtful comments which helped us improve the initial submitted version of this manuscript.  ... 
doi:10.1109/tit.2010.2051470 fatcat:dln2ycsxfvew7dlleijj3xrhda

Mobile Ad Hoc Networks: The DHT paradigm

Marcello Caleffi
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
Ad Hoc On-Demand Distance Vector Routing The Ad Hoc On-Demand Distance Vector (AODV) protocol [42] is a widely adopted reactive protocol for mobile ad hoc networks.  ...  This is the largest class of routing protocols available in ad hoc networks, mainly composed by routing protocols for wired networks modified to cope with ad hoc environments.  ... 
doi:10.1109/percom.2009.4912808 dblp:conf/percom/Caleffi09 fatcat:nvozjrmghfg7ngoqlunun7rt4y
« Previous Showing results 1 — 15 out of 1,009 results