scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Mobile Computing in 2004"


Journal ArticleDOI
TL;DR: It is proved that, with appropriate bounds on node density and intracluster and intercluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks.
Abstract: Topology control in a sensor network balances load on sensor nodes and increases network scalability and lifetime. Clustering sensor nodes is an effective topology control approach. We propose a novel distributed clustering approach for long-lived ad hoc sensor networks. Our proposed approach does not make any assumptions about the presence of infrastructure or about node capabilities, other than the availability of multiple power levels in sensor nodes. We present a protocol, HEED (Hybrid Energy-Efficient Distributed clustering), that periodically selects cluster heads according to a hybrid of the node residual energy and a secondary parameter, such as node proximity to its neighbors or node degree. HEED terminates in O(1) iterations, incurs low message overhead, and achieves fairly uniform cluster head distribution across the network. We prove that, with appropriate bounds on node density and intracluster and intercluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks. Simulation results demonstrate that our proposed approach is effective in prolonging the network lifetime and supporting scalable data aggregation.

4,889 citations


Journal ArticleDOI
TL;DR: This work derives the stationary distributions for location, speed, and pause time for the random waypoint mobility model and shows how to implement it in order to construct more efficient and reliable simulations for mobile ad hoc networks.
Abstract: In simulations of mobile ad hoc networks, the probability distribution governing the movement of the nodes typically varies over time and converges to a "steady-state" distribution, known in the probability literature as the stationary distribution. Some published simulation results ignore this initialization discrepancy. For those results that attempt to account for this discrepancy, the practice is to discard an initial sequence of observations from a simulation in the hope that the remaining values will closely represent the stationary distribution. This approach is inefficient and not always reliable. However, if the initial locations and speeds of the nodes are chosen from the stationary distribution, convergence is immediate and no data need be discarded. We derive the stationary distributions for location, speed, and pause time for the random waypoint mobility model. We then show how to implement the random waypoint mobility model in order to construct more efficient and reliable simulations for mobile ad hoc networks. Simulation results, which verify the correctness of our method, are included. In addition, implementation of our method for the NS-2 simulator is available.

567 citations


Journal Article
TL;DR: In this paper, a hierarchical hierarchical clustering algorithm for target tracking is proposed, where each cluster is composed of a static backbone of sparsely placed high-capability sensors and moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request.
Abstract: In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the sensors, we envision a hierarchical sensor network that is composed of 1) a static backbone of sparsely placed high-capability sensors which will assume the role of a cluster head (CH) upon triggered by certain signal events and 2) moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request. A cluster is formed and a CH becomes active, when the acoustic signal strength detected by the CH exceeds a predetermined threshold. The active CH then broadcasts an information solicitation packet, asking sensors in its vicinity to join the cluster and provide their sensing information. We address and devise solution approaches (with the use of Voronoi diagram) to realize dynamic clustering: (I1) how CHs cooperate with one another to ensure that only one CH (preferably the CH that is closest to the target) is active with high probability, (12) when the active CH solicits for sensor information, instead of having all the sensors in its vicinity reply, only a sufficient number of sensors respond with nonredundant, essential information to determine the target location, and (13) both the packets that sensors send to their CHs and packets that CHs report to subscribers do not incur significant collision. Through both probabilistic analysis and ns-2 simulation, we show with the use of Voronoi diagram, the CH that is usually closest to the target is (implicitly) selected as the leader and that the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders more accurate estimates of target locations as a result of better quality data collected and less collision incurred.

481 citations


Journal ArticleDOI
TL;DR: Through both probabilistic analysis and ns-2 simulation, the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders more accurate estimates of target locations as a result of better quality data collected and less collision incurred.
Abstract: We devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the sensors, we envision a hierarchical sensor network that is composed of 1) a static backbone of sparsely placed high-capability sensors which assume the role of a cluster head (CH) upon triggered by certain signal events and 2) moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request. A cluster is formed and a CH becomes active, when the acoustic signal strength detected by the CH exceeds a predetermined threshold. The active CH then broadcasts an information solicitation packet, asking sensors in its vicinity to join the cluster and provide their sensing information. We address and devise solution approaches (with the use of Voronoi diagram) to realize dynamic clustering: (I1) how CHs operate with one another to ensure that only one CH (preferably the CH that is closes to the target) is active with high probability, (I2) when the active CH solicits for sensor information, instead of having all the sensors in its vicinity reply, only a sufficient number of sensors respond with nonredundant, essential information to determine the target location, and (I3) both the packets that sensors send to their CHs and packets that CHs report to subscribers do not incur significant collision. Through both probabilistic analysis and ns-2 simulation, we use with the use of Voronoi diagram, the CH that is usually closes to the target is (implicitly) selected as the leader and that the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders more accurate estimates of target locations as a result of better quality data collected and less collision incurred.

473 citations


Journal ArticleDOI
TL;DR: The ASCENT algorithm is motivated and described and it is shown that the system achieves linear increase in energy savings as a function of the density and the convergence time required in case of node failures while still providing adequate connectivity.
Abstract: Advances in microsensor and radio technology enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low-per node cost allows these wireless networks of sensors and actuators to be densely distributed. The nodes in these dense networks coordinate to perform the distributed sensing and actuation tasks. Moreover, as described in this paper, the nodes can also coordinate to exploit the redundancy provided by high density so as to extend overall system lifetime. The large number of nodes deployed in this systems preclude manual configuration, and the environmental dynamics precludes design-time preconfiguration. Therefore, nodes have to self-configure to establish a topology that provides communication under stringent energy constraints. ASCENT builds on the notion that, as density increases, only a subset of the nodes is necessary to establish a routing forwarding backbone. In ASCENT, each node assesses its connectivity and adapts its participation in the multihop network topology based on the measured operating region. This paper motivates and describes the ASCENT algorithm and presents analysis, simulation, and experimental measurements. We show that the system achieves linear increase in energy savings as a function of the density and the convergence time required in case of node failures while still providing adequate connectivity.

452 citations


Journal ArticleDOI
TL;DR: It is recommended that metrics for the rate performance of mobile ad hoc networking protocols be based on proportional fairness, an alternative to max-min fairness, which approximates rate allocation performed by TCP in the Internet.
Abstract: We consider the question of what performance metric to maximize when designing ad hoc wireless network protocols such as routing or MAC. We focus on maximizing rates under battery-lifetime and power constraints. Commonly used metrics are total capacity (in the case of cellular networks) and transport capacity (in the case of ad hoc networks). However, it is known in traditional wired networking that maximizing total capacity conflicts with fairness, and this is why fairness-oriented rate allocations, such as max-min fairness, are often used. We review this issue for wireless ad hoc networks. Indeed, the mathematical model for wireless networks has a specificity that makes some of the findings different. It has been reported in the literature on ultra wide band that gross unfairness occurs when maximizing total capacity or transport capacity, and we confirm by a theoretical analysis that this is a fundamental shortcoming of these metrics in wireless ad hoc networks, as it is for wired networks. The story is different for max-min fairness. Although it is perfectly viable for a wired network, it is much less so in our setting. We show that, in the limit of long battery lifetimes, the max-min allocation of rates always leads to strictly equal rates, regardless of the MAC layer, network topology, channel variations, or choice of routes and power constraints. This is due to the "solidarity" property of the set of feasible rates. This results in all flows receiving the rate of the worst flow, and leads to severe inefficiency. We show numerically that the problem persists when battery-lifetime constraints are finite. This generalizes the observation reported in the literature that, in heterogeneous settings, 802.11 allocates the worst rate to all stations, and shows that this is inherent to any protocol that implements max-min fairness. Utility fairness is an alternative to max-min fairness, which approximates rate allocation performed by TCP in the Internet. We analyze by numerical simulations different utility functions and we show that the proportional fairness of rates or transport rates, a particular instance of utility-based metrics, is robust and achieves a good tradeoff between efficiency and fairness, unlike total rate or maximum fairness. We thus recommend that metrics for the rate performance of mobile ad hoc networking protocols be based on proportional fairness.

220 citations


Journal ArticleDOI
TL;DR: This work identifies two main problems, named LLNK and LOOP, that are caused by mobility-induced location errors and proposes two mobility prediction schemes - neighbor location prediction (NLP) and destination location predictions (DLP) to mitigate these problems.
Abstract: Geographic routing has been introduced in mobile ad hoc networks and sensor networks. Under ideal settings, it has been proven to provide drastic performance improvement over strictly address centric routing schemes. While geographic routing has been shown to be correct and efficient when location information is accurate, its performance in the face of location errors is not well understood. We study the effect of inaccurate location information caused by node mobility under a rich set of scenarios and mobility models. We identify two main problems, named LLNK and LOOP, that are caused by mobility-induced location errors. Based on analysis via ns-2 simulations, we propose two mobility prediction schemes - neighbor location prediction (NLP) and destination location prediction (DLP) to mitigate these problems. Simulation results show noticeable improvement under all mobility models used in our study. Under the settings we examine, our schemes achieve up to 27 percent improvement in packet delivery and 37 percent reduction in network resource wastage, on average without incurring any additional communication or intense computation.

190 citations


Journal ArticleDOI
TL;DR: In this paper, a medium access control (MAC) protocol for ad hoc networks with multiple input multiple output (MIMO) links is presented, which is based on stream-controlled medium access (SCMA).
Abstract: we present a medium access control (MAC) protocol for ad hoc networks with multiple input multiple output (MIMO) links. MIMO links provide extremely high spectral efficiencies in multipath channels by simultaneously transmitting multiple independent data streams in the same channel. MAC protocols have been proposed in related work for ad hoc networks with other classes of smart antennas such as switched beam antennas. However, as we substantiate in the paper, the unique characteristics of MIMO links coupled with several key optimization considerations, necessitate an entirely new MAC protocol. We identify several advantages of MIMO links, and discuss key optimization considerations that can help in realizing an effective MAC protocol for such an environment. We present a centralized algorithm called stream-controlled medium access (SCMA) that has the key optimization considerations incorporated in its design. Finally, we present a distributed SCMA protocol that approximates the centralized algorithm and compare its performance against that of baseline protocols that are CSMA/CA variants.

178 citations


Journal ArticleDOI
TL;DR: This work investigates the network topology according to the region of deployment, the number of deployed sensors, and their transmitting/sensing ranges, and shows how these results affect algorithmic aspects of the network by designing specific distributed protocols for sensor networks.
Abstract: We analyze various critical transmitting/sensing ranges for connectivity and coverage in three-dimensional sensor networks. As in other large-scale complex systems, many global parameters of sensor networks undergo phase transitions. For a given property of the network, there is a critical threshold, corresponding to the minimum amount of the communication effort or power expenditure by individual nodes, above (respectively, below) which the property exists with high (respectively, a low) probability. For sensor networks, properties of interest include simple and multiple degrees of connectivity/coverage. First, we investigate the network topology according to the region of deployment, the number of deployed sensors, and their transmitting/sensing ranges. More specifically, we consider the following problems: assume that n nodes, each capable of sensing events within a radius of r, are randomly and uniformly distributed in a 3-dimensional region R of volume V, how large must the sensing range R/sub SENSE/ be to ensure a given degree of coverage of the region to monitor? For a given transmission range R/sub TRANS/, what is the minimum (respectively, maximum) degree of the network? What is then the typical hop diameter of the underlying network? Next, we show how these results affect algorithmic aspects of the network by designing specific distributed protocols for sensor networks.

173 citations


Journal ArticleDOI
TL;DR: It is found that, although the peer-to-peer network model has significantly better spatial reuse characteristics, the improved spatial reuse does not translate into better throughput performance and might actually degrade the throughput performance of the network.
Abstract: A recent class of approaches for enhancing the performance of cellular wireless data networks has focused on improving the underlying network model. It has been shown that using the peer-to-peer network model, a mode of communication typically seen in ad hoc wireless networks, can result in performance improvements such as increased data rate, reduced transmission power, better load balancing, and enhanced network coverage. However, the true impact of adopting the peer-to-peer network model in such an environment is yet to be fully understood. In this paper, we investigate the performance benefits and drawbacks of using the peer-to-peer network model for Internet access in cellular wireless data networks. We find that, although the peer-to-peer network model has significantly better spatial reuse characteristics, the improved spatial reuse does not translate into better throughput performance. Instead, we observe that using the peer-to-peer network model as-is might actually degrade the throughput performance of the network. We identify and discuss the reasons behind these observations. Using the insights gained through the performance evaluations, we then propose two categories of approaches to improve the performance of the peer-to-peer network model: approaches that leverage assistance from the base station and approaches that leverage the relaying capability of multihomed hosts. Through simulation results, we show that using the peer-to-peer network model in cellular wireless data networks is a promising approach when the network model is complemented with appropriate mechanisms.

143 citations


Journal ArticleDOI
TL;DR: It is proved that the problem of finding a broadcast tree such that the energy cost of the broadcast tree is minimized, and three heuristic algorithms are proposed, namely, shortest path tree heuristic, greedyHeuristic, and node weighted Steiner tree-based heuristic which are centralized algorithms.
Abstract: In this paper, we discuss energy efficient broadcast in ad hoc wireless networks. The problem of our concern is: given an ad hoc wireless network, find a broadcast tree such that the energy cost of the broadcast tree is minimized. Each node in the network is assumed to have a fixed level of transmission power. We first prove that the problem is NP-hard and propose three heuristic algorithms, namely, shortest path tree heuristic, greedy heuristic, and node weighted Steiner tree-based heuristic, which are centralized algorithms. The approximation ratio of the node weighted Steiner tree-based heuristic is proven to be (1 + 2 ln(n - 1)). Extensive simulations have been conducted and the results have demonstrated the efficiency of the proposed algorithms.

Journal ArticleDOI
TL;DR: Two new user-perceived QoS metrics, degradation ratio and upgrade/degrade frequency, are proposed and a Markov model is provided to derive them, demonstrating the applicability of the analytical model to more general cases.
Abstract: A wireless/mobile network supporting multilevel quality of service (QoS) is considered. In such a network, users or applications can tolerate a certain degree of QoS degradation. Bandwidth allocation to users can, therefore, be adjusted dynamically according to the underlying network condition so as to increase bandwidth utilization and service provider's revenue. However, arbitrary QoS degradation may be unsatisfactory or unacceptable to the users, hence resulting in their subsequent defection. Instead of only focusing on bandwidth utilization or blocking/dropping probability, two new user-perceived QoS metrics, degradation ratio and upgrade/degrade frequency, are proposed. A Markov model is then provided to derive these QoS metrics. Using this model, we evaluate the effects of adaptive bandwidth allocation on user-perceived QoS and show the existence of trade offs between system performance and user-perceived QoS. We also show how to exploit adaptive bandwidth allocation to increase system utilization (for the system administrator) with controlled QoS degradation (for the users). By considering various mobility patterns, the simulation results are shown to match our analytical results, demonstrating the applicability of our analytical model to more general cases.

Journal ArticleDOI
TL;DR: This paper presents the CLTC framework; describes topology control algorithms based on CLTC and proves that k-connectivity is achieved using those algorithms; analyzes the message complexity of an implementation of CLTC, namely, CLTC-A, and presents simulation studies that evaluate the effectiveness of CL TC-A for a range of networks.
Abstract: The topology of an ad hoc network has a significant impact on its performance in that a dense topology may induce high interference and low capacity, while a sparse topology is vulnerable to link failure and network partitioning. Topology control aims to maintain a topology that optimizes network performance while minimizing energy consumption. Existing topology control algorithms utilize either a purely centralized or a purely distributed approach. A centralized approach, although able to achieve strong connectivity (k-connectivity for k /spl ges/ 2), suffers from scalability problems. In contrast, a distributed approach, although scalable, lacks strong connectivity guarantees. We propose a hybrid topology control framework, cluster-based topology control (CLTC) that achieves both scalability and strong connectivity. By varying the algorithms utilized in each of the three phases of the framework, a variety of optimization objectives and topological properties can be achieved. In this paper, we present the CLTC framework; describe topology control algorithms based on CLTC and prove that k-connectivity is achieved using those algorithms; analyze the message complexity of an implementation of CLTC, namely, CLTC-A, and present simulation studies that evaluate the effectiveness of CLTC-A for a range of networks.

Journal ArticleDOI
TL;DR: This paper uses a distributed simulated annealing framework to govern the motion of the nodes of a mobile ad hoc sensor network and proves that, in a limiting sense, a global objective function comprising mobility and communication energy costs are minimized.
Abstract: We consider a mobile ad hoc sensor network. The mobility of the sensor nodes is designed with the cost of communication and mobility in mind along with consideration of the possible scanning tasks of the nodes. Our mobility algorithm is developed in the context of a distributed system where, for any single mobile node, only local information about associated energy costs is known. We use a distributed simulated annealing framework to govern the motion of the nodes and prove that, in a limiting sense, a global objective function comprising mobility and communication energy costs are minimized. This paper concludes with a simulation study focusing on mobile sensors with dual roles of scanning and relaying higher priority tracking traffic from tracking nodes.

Journal ArticleDOI
TL;DR: This paper proposes TIBET (time intervals based bandwidth estimation technique), a new bandwidth estimation scheme that can be implemented within the TCP congestion control procedure, modifying only the sender-side of a connection, and enhances TCP source performance over wireless links.
Abstract: The use of enhanced bandwidth estimation procedures within the congestion control scheme of TCP was proposed recently as a way of improving TCP performance over links affected by random loss. This paper first analyzes the problems faced by every bandwidth estimation algorithm implemented at the sender side of a TCP connection. Some proposed estimation algorithms are then reviewed, analyzing and comparing their estimation accuracy and performance. As existing algorithms are poor in bandwidth estimation, and in sharing network resources fairly, we propose TIBET (time intervals based bandwidth estimation technique). This is a new bandwidth estimation scheme that can be implemented within the TCP congestion control procedure, modifying only the sender-side of a connection. The use of TIBET enhances TCP source performance over wireless links. The performance of TIBET is analyzed and compared with other schemes. Moreover, by studying TCP behavior with an ideal bandwidth estimation, we provide an upper bound to the performance of all possible schemes based on different bandwidth estimates.

Journal ArticleDOI
TL;DR: Simulation results show that the hub-spoke topology built by ROP can achieve much longer system lifetime and use a reactive strategy to maintain route cache to avoid overhead of periodic route updates.
Abstract: As a specific area of sensor networks, wireless in-home sensor networks differ from general sensor networks in that the network has nodes with heterogeneous resources and dissimilar mobility attributes. For example, sensor with different radio coverage, energy capacity, and processing capabilities are deployed, and some of the sensors are mobile and others are fixed in position. The architecture and routing protocol for this type of heterogeneous sensor networks must be based on the resources and characteristics of their member nodes. In addition, the sole stress on energy efficiency for performance measurement is not sufficient. System lifetime is more important in this case. We propose a hub-spoke network topology that is adaptively formed according to the resources of its members. A protocol named resource oriented protocol (ROP) was developed to build the network topology. This protocol principally divides the network operation into two phases. In the topology formation phase, nodes report their available resource characteristics, based on which network architecture is optimally built. We stress that due to the existence of nodes with limitless resources, a top-down appointment process can build the architecture with minimum resource consumption of ordinary nodes. In the topology update phase, mobile sensors and isolated sensors are accepted into the network with an optimal balance of resources. To avoid overhead of periodic route updates, we use a reactive strategy to maintain route cache. Simulation results show that the hub-spoke topology built by ROP can achieve much longer system lifetime.

Journal ArticleDOI
TL;DR: This paper proposes a comprehensive solution for power control in mobile ad hoc networks (MANETs), whereby the MAC layer indirectly influences the selection of the next-hop by properly adjusting the power of route request packets.
Abstract: In this paper, we propose a comprehensive solution for power control in mobile ad hoc networks (MANETs). Our solution emphasizes the interplay between the MAC and network layers, whereby the MAC layer indirectly influences the selection of the next-hop by properly adjusting the power of route request packets. This is done while maintaining network connectivity. Channel-gain information obtained mainly from overheard RTS and CTS packets is used to dynamically construct the network topology. Unlike the IEEE 802.11 approach and previously proposed schemes, ours does not use the RTS/CTS packets to silence the neighboring nodes. Instead, collision avoidance information is inserted in the CTS packets and sent over an out-of-band control channel. This information is used to dynamically bound the transmission power of potentially interfering nodes in the vicinity of a receiver. By properly estimating the required transmission power for data packets, our protocol allows for interference-limited simultaneous transmissions to take place in the neighborhood of a receiving node. Simulation results indicate that, compared to the IEEE 802.11 approach, the proposed protocol achieves a significant increase in the channel utilization and end-to-end network throughput and a significant decrease in the total energy consumption.

Journal ArticleDOI
TL;DR: This paper reexamines the fairness notion in an ad hoc network using a graph-theoretic formulation and proposes maximize-local-minimum fair queueing (MLM-FQ), a novel distributed packet scheduling algorithm where local schedulers self-coordinate their scheduling decisions and collectively achieve fair bandwidth sharing.
Abstract: Distributed fair queueing in a multihop, wireless ad hoc network is challenging for several reasons. First, the wireless channel is shared among multiple contending nodes in a spatial locality. Location-dependent channel contention complicates the fairness notion. Second, the sender of a flow does not have explicit information regarding the contending flows originated from other nodes. Fair queueing over ad hoc networks is a distributed scheduling problem by nature. Finally, the wireless channel capacity is a scarce resource. Spatial channel reuse, i.e., simultaneous transmissions of flows that do not interfere with each other, should be encouraged whenever possible. In this paper, we reexamine the fairness notion in an ad hoc network using a graph-theoretic formulation and extract the fairness requirements that an ad hoc fair queueing algorithm should possess. To meet these requirements, we propose maximize-local-minimum fair queueing (MLM-FQ), a novel distributed packet scheduling algorithm where local schedulers self-coordinate their scheduling decisions and collectively achieve fair bandwidth sharing. We then propose enhanced MLM-FQ (EMLM-FQ) to further improve the spatial channel reuse and limit the impact of inaccurate scheduling information resulted from collisions. EMLM-FQ achieves statistical short-term throughput and delay bounds over the shared wireless channel. Analysis and extensive simulations confirm the effectiveness and efficiency of our self-coordinating localized design in providing global fair channel access in wireless ad hoc networks.

Journal ArticleDOI
TL;DR: This paper assesses the scalability, with respect to increasing node count, of hierarchical routing in mobile ad hoc networks (MANETs) and shows that /spl Phi/ is only polylogarithmic in the node count.
Abstract: Hierarchical techniques have long been known to afford scalability in networks. By summarizing topology detail via a hierarchical map of the network topology, network nodes are able to conserve memory and link resources. Extensive analysis of the memory requirements of hierarchical routing was undertaken in the 1970s. However, there has been little published work that assesses analytically the communication overhead incurred in hierarchical routing. This paper assesses the scalability, with respect to increasing node count, of hierarchical routing in mobile ad hoc networks (MANETs). The performance metric of interest is the number of control packet transmissions per second per node (/spl Phi/). To derive an expression for /spl Phi/, the components of hierarchical routing that incur overhead as a result of hierarchical cluster formation and location management are identified. It is shown here that /spl Phi/ is only polylogarithmic in the node count.

Journal Article
TL;DR: In this paper, a joint power controlled medium access control (MAC) algorithm for wireless access nets (ANets) is proposed, in which the backbone node instructs the access nodes to make power control adjustments while simultaneously allocating to them slots for the requested transmissions of their packets.
Abstract: We consider ad hoc wireless networks that are configured as Mobile Backbone Networks. A hierarchical network architecture is synthesized, consisting of Access Nets (ANets) and Backbone Nets (BNets). Each ANet is managed by a (dynamically elected) Backbone Node (BN) that is equipped with higher capability (transmission and processing) modules. The BNs are chosen from currently active mobile backbone-capable nodes or are represented by (ground and/or airborne) unmanned vehicles (UVs) that are guided into selected positions. In this paper, we develop and investigate a new joint power controlled medium access control (MAC) algorithm for wireless access nets (ANets). Under our new protocol, the net backbone node instructs the ANet nodes to make power control adjustments while simultaneously allocating to them slots for the requested transmissions of their packets. This algorithm, in contrast to other employed conventional graph-based scheduling algorithms, satisfies the requirement that a minimum signal-to-interference and noise ratio (SINR) is met at all intended receivers. We show our algorithm to lead to a significant increase in the net throughput level by attaining high spatial reuse.

Journal ArticleDOI
TL;DR: PILOT is presented, a two-layer system consisting of a set of protocols for reliable multicasting and data sharing in mobile ad hoc networks, which is predictable and controllable in terms of both reliability (fault tolerance) and efficiency (overhead).
Abstract: Providing reliable group communication is an ever recurring topic in distributed settings. In mobile ad hoc networks, this problem is even more significant since all nodes act as peers, while it becomes more challenging due to highly dynamic and unpredictable topology changes. In order to overcome these difficulties, we deviate from the conventional point of view, i.e., we "fight fire with fire," by exploiting the nondeterministic nature of ad hoc networks. Inspired by the principles of gossip mechanisms and probabilistic quorum systems, we present in this paper PILOT (probabilistic lightweight group communication system) for ad hoc networks, a two-layer system consisting of a set of protocols for reliable multicasting and data sharing in mobile ad hoc networks. The performance of PILOT is predictable and controllable in terms of both reliability (fault tolerance) and efficiency (overhead). We present an analysis of PILOT's performance, which is used to fine-tune protocol parameters to obtain the desired trade off between reliability and efficiency. We confirm the predictability and tunability of PILOT through simulations with ns-2.

Journal ArticleDOI
TL;DR: To mitigate the sampling clock induced time delay error, a sampling clock synchronization approach is provided that obviates the need of an automatic frequency control clock recovery circuit and to improve the channel estimation accuracy using the decoded data, a semiblind channel estimation method is presented.
Abstract: We consider parameter estimation and error reduction for orthogonal frequency-division multiplexing (OFDM) based high-speed wireless local area networks (WLANs). We devise or select algorithms that can provide benefit to the overall system performance and can be efficiently implemented in real-time. In particular, first, we give a channel model which is especially useful for assessing the channel parameter estimation methods devised for OFDM-based WLANs. Second, we provide a sequential method for the estimation of carrier frequency offset (CFO), symbol timing, and channel response by exploiting the structure of the packet preamble specified by the IEEE 802.11a standard. Finally, to correct the residue CFO induced phase error using the pilot tones, we consider maximum-likelihood phase tracking and least-squares phase fitting approaches; to improve the channel estimation accuracy using the decoded data, we present a semiblind channel estimation method; to mitigate the sampling clock induced time delay error, we provide a sampling clock synchronization approach that obviates the need of an automatic frequency control clock recovery circuit. The overall system performance of using our algorithms is demonstrated via several numerical examples.

Journal ArticleDOI
TL;DR: A QoS-oriented medium access control (MAC) protocol with fair packet loss sharing (FPLS) scheduling is proposed for wireless code-division multiple access (CDMA) communications and results demonstrate effectiveness of the FPLS scheduler, in comparison with other previously proposed scheduling algorithms.
Abstract: In the third-generation (and beyond) wireless communication systems, there will be a mixture of different traffic classes, each having its own transmission rate characteristics and quality-of-service (QoS) requirements. In this paper, a QoS-oriented medium access control (MAC) protocol with fair packet loss sharing (FPLS) scheduling is proposed for wireless code-division multiple access (CDMA) communications. The QoS parameters under consideration are the transmission bit error rate (BER), packet loss, and delay requirements. The MAC protocol exploits both time-division and code-division statistical multiplexing. The BER requirements are guaranteed by properly arranging simultaneous packet transmissions and controlling there transmit power levels, whereas the packet loss and delay requirements are guaranteed by proper packet scheduling. The basic idea of FPLS is to schedule the transmission of multimedia packets in such a way that all the users have a fair share of packet loss according to their QoS requirements, which maximizes the number of the served users under the QoS constraints. Simulation results demonstrate effectiveness of the FPLS scheduler, in comparison with other previously proposed scheduling algorithms.

Journal ArticleDOI
TL;DR: In this article, an approximate maximum-likelihood (AML) method for source localization and direction-of-arrival (DOA) estimation is proposed for real-time operation.
Abstract: Wireless sensor networks have been attracting increasing research interest given the recent advances in microelectronics, array processing, and wireless networking. Consisting of a large collection of small, wireless, low-cost, integrated sensing, computing and communicating nodes capable of performing various demanding collaborative space-time processing tasks, wireless sensor network technology poses various unique design challenges, particularly for real-time operation. We review the approximate maximum-likelihood (AML) method for source localization and direction-of-arrival (DOA) estimation. Then, we consider the use of least-squares method (LS) method applied to DOA bearing crossings to perform source localization. A novel virtual array model applicable to the AML-DOA estimation method is proposed for reverberant scenarios. Details on the wireless acoustical testbed are given. We consider the use of Compaq iPAQ 3760s, which are handheld, battery-powered device normally meant to be used as personal organizers (PDAs), as sensor nodes. The iPAQ provide a reasonable balance of cost, availability, and functionality. It has a build in StrongARM processor, microphone, codec for acoustic acquisition and processing, and a PCMCIA bus for external IEEE 802.11b wireless cards for radio communication. The iPAQs form a distributed sensor network to perform real-time acoustical beamforming. Computational times and associated real-time processing tasks are described. Field measured results for linear, triangular, and square subarrays in free-space and reverberant scenarios are presented. These results show the effective and robust operation of the proposed algorithms and their implementations on a real-time acoustical wireless testbed.

Journal ArticleDOI
TL;DR: This work develops and investigates a new joint power controlled medium access control (MAC) algorithm for wireless access nets (ANets) and shows its algorithm to lead to a significant increase in the net throughput level by attaining high spatial reuse.
Abstract: We consider ad hoc wireless networks that are configured as Mobile Backbone Networks A hierarchical network architecture is synthesized, consisting of Access Nets (ANets) and Backbone Nets (BNets) Each ANet is managed by a (dynamically elected) Backbone Node (BN) that is equipped with higher capability (transmission and processing) modules The BNs are chosen from currently active mobile backbone-capable nodes or are represented by (ground and/or airborne) unmanned vehicles (UVs) that are guided into selected positions We develop and investigate a new joint power controlled medium access control (MAC) algorithm for wireless access nets (ANets) Under our new protocol, the net backbone node instructs the ANet nodes to make power control adjustments while simultaneously allocating to them slots for the requested transmissions of their packets This algorithm, in contrast to other employed conventional graph-based scheduling algorithms, satisfies the requirement that a minimum signal-to-interference and noise ratio (SINR) is met at all intended receivers We show our algorithm to lead to a significant increase in the net throughput level by attaining high spatial reuse

Journal ArticleDOI
TL;DR: In this article, the authors propose a partitionable group membership service supporting ad hoc mobile applications and propose a protocol for implementing the service, where messages sent between group members are guaranteed to be delivered successfully given appropriate system assumptions.
Abstract: The design of ad hoc mobile applications often requires the availability of a consistent view of the application state among the participating hosts. Such views are important because they simplify both the programming and verification tasks. We argue that preventing the occurrence of unannounced disconnection is essential to constructing and maintaining a consistent view in the ad hoc mobile environment. In this light, we provide the specification for a partitionable group membership service supporting ad hoc mobile applications and propose a protocol for implementing the service. A unique property of this partitionable group membership is that messages sent between group members are guaranteed to be delivered successfully, given appropriate system assumptions. This property is preserved over time despite movement and frequent disconnections. The protocol splits and merges groups and maintains a logical connectivity graph based on a notion of safe distance. An implementation of the protocol in Java is available for testing. This work is used in an implementation of LIME, a middleware for mobility that supports transparent sharing of data in both wired and ad hoc wireless environments.

Journal ArticleDOI
TL;DR: These analytical models, which were derived under some simplifying assumptions, predict retransmission probabilities for static and mobile networks quite accurately when only the network layer is considered.
Abstract: Network wide broadcast is a fundamental operation in mobile ad hoc networks (MANETs). Several broadcast protocols have been proposed in the literature that improves on simple flooding by reducing the probability that a receiving node retransmits a packet. We propose analytical models to estimate these probabilities for three broadcast protocols. Our simulations show that these analytical models, which were derived under some simplifying assumptions, predict retransmission probabilities for static and mobile networks quite accurately when only the network layer is considered.

Journal ArticleDOI
TL;DR: This work proposes the use of Content-Based Multicast (CBM) where extra content filtering is performed at the interior nodes of the IP multicast tree; this will reduce network bandwidth usage and delivery delay, as well as the computation required at the sources and sinks.
Abstract: There has been a surge of interest in the delivery of personalized information to users (eg, personalized stocks or travel information), particularly as mobile users with limited terminal device capabilities increasingly desire updated and targeted information in real time When the number of information recipients is large and there is sufficient commonality in their interests, as is often the case, IP multicast is an efficient way of delivering the information However, IP multicast services do not consider the structure and semantics of the information in the multicast process We propose the use of Content-Based Multicast (CBM) where extra content filtering is performed at the interior nodes of the IP multicast tree; this will reduce network bandwidth usage and delivery delay, as well as the computation required at the sources and sinks We evaluate the situations in which CBM is advantageous The benefits of CBM depend critically upon how well filters are placed at interior nodes of the IP multicast tree and the costs depend upon those introduced by filters themselves Further, we consider the benefits of allowing the filters to be mobile so as to respond to user mobility or changes in user interests and the corresponding costs of filter mobility The criterion that we consider is the total network bandwidth utilization For this criterion, we develop an optimal filter placement algorithm, as well as a heuristic that executes faster than the optimal algorithm We evaluate the algorithms by means of simulation experiments Our results indicate that filters can be effective in substantially reducing bandwidth We also find filter mobility is worthwhile if there is marked large-scale user mobility We conclude with suggestions for further work

Journal ArticleDOI
TL;DR: In this paper, the authors provide an overview of the concept of network self-assembly for ad hoc wireless sensor networks at the link layer, with descriptions of results from implementation of a novel network formation mechanism for wireless unattended ground sensor applications using a multicluster hierarchical topology and a novel dual-radio architecture.
Abstract: In distributed wireless sensing applications such as unattended ground sensor systems, remote planetary exploration, and condition-based maintenance, where the deployment site is remote and/or the scale of the network is large, individual emplacement and configuration of the sensor nodes is difficult. Hence, network self-assembly and continuous network self-organization during the lifetime of the network in a reliable, efficient, and scalable manner are crucial for successful deployment and operation of such networks. This paper provides an overview of the concept of network self-assembly for ad hoc wireless sensor networks at the link layer, with descriptions of results from implementation of a novel network formation mechanism for wireless unattended ground sensor applications using a multicluster hierarchical topology and a novel dual-radio architecture.

Journal ArticleDOI
TL;DR: This paper proposes a novel scheme named Courtesy Piggybacking, which exploits the channel dynamics and stochastic traffic features to alleviate the conflict between throughput and fairness for different prioritized traffic.
Abstract: Due to the salient characteristics such as the time-varying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with different quality of service (CoS) requirements in multihop mobile ad hoc networks. In the last few years, many channel-dependent mechanisms are proposed to address this issue based on the cross-layer design philosophy. However, a lot of problems remain before more efficient solutions are found. One of the problems is how to alleviate the conflict between throughput and fairness for different prioritized traffic, especially how to avoid the bandwidth starvation problem for low-priority traffic when the high-priority traffic load is very high. In this paper, we propose a novel scheme named Courtesy Piggybacking to address this problem. With the recognition of interlayer coupling, our Courtesy Piggybacking scheme exploits the channel dynamics and stochastic traffic features to alleviate the conflict. The basic idea is to let the high-priority traffic help the low-priority traffic by sharing unused residual bandwidth with courtesy. Another noteworthy feature of the proposed scheme is its implementation simplicity: The scheme is easy to implement and is applicable in networks using either reservation-based or contention-based MAC protocols.