scispace - formally typeset
Search or ask a question

Showing papers in "Wireless Networks in 2004"


Journal ArticleDOI
TL;DR: This paper presents LANDMARC, a location sensing prototype system that uses Radio Frequency Identification (RFID) technology for locating objects inside buildings and demonstrates that active RFID is a viable and cost-effective candidate for indoor location sensing.
Abstract: Growing convergence among mobile computing devices and embedded technology sparks the development and deployment of "context-aware" applications, where location is the most essential context. In this paper we present LANDMARC, a location sensing prototype system that uses Radio Frequency Identification (RFID) technology for locating objects inside buildings. The major advantage of LANDMARC is that it improves the overall accuracy of locating objects by utilizing the concept of reference tags. Based on experimental analysis, we demonstrate that active RFID is a viable and cost-effective candidate for indoor location sensing. Although RFID is not designed for indoor location sensing, we point out three major features that should be added to make RFID technologies competitive in this new and growing market.

2,615 citations


Journal ArticleDOI
TL;DR: The random waypoint model is a commonly used mobility model for simulations of wireless communication networks and some of its fundamental stochastic properties are investigated, including the transition length and time of a mobile node between two waypoints, the spatial distribution of nodes, and the direction angle at the beginning of a movement transition.
Abstract: The random waypoint model is a commonly used mobility model for simulations of wireless communication networks. By giving a formal description of this model in terms of a discrete-time stochastic process, we investigate some of its fundamental stochastic properties with respect to: (a) the transition length and time of a mobile node between two waypoints, (b) the spatial distribution of nodes, (c) the direction angle at the beginning of a movement transition, and (d) the cell change rate if the model is used in a cellular-structured system area. The results of this paper are of practical value for performance analysis of mobile networks and give a deeper understanding of the behavior of this mobility model. Such understanding is necessary to avoid misinterpretation of simulation results. The movement duration and the cell change rate enable us to make a statement about the "degree of mobility" of a certain simulation scenario. Knowledge of the spatial node distribution is essential for all investigations in which the relative location of the mobile nodes is important. Finally, the direction distribution explains in an analytical manner the effect that nodes tend to move back to the middle of the system area.

888 citations


Journal ArticleDOI
TL;DR: It is shown that in a network with n randomly placed nodes, each node should be connected to Θ(log n) nearest neighbors, and it appears that the critical constant may be close to one, but that remains an open problem.
Abstract: Unlike wired networks, wireless networks do not come with links. Rather, links have to be fashioned out of the ether by nodes choosing neighbors to connect to. Moreover the location of the nodes may be random.The question that we resolve is: How many neighbors should each node be connected to in order that the overall network is connected in a multi-hop fashion? We show that in a network with n randomly placed nodes, each node should be connected to Θ(log n) nearest neighbors. If each node is connected to less than 0.074 log n nearest neighbors then the network is asymptotically disconnected with probability one as n increases, while if each node is connected to more than 5.1774 log n nearest neighbors then the network is asymptotically connected with probability approaching one as n increases. It appears that the critical constant may be close to one, but that remains an open problem.These results should be contrasted with some works in the 1970s and 1980s which suggested that the "magic number" of nearest neighbors should be six or eight.

885 citations


Journal Article
TL;DR: The results show that under dynamic traffic patterns with realistic topologies, MUP significantly improves both TCP throughput and user perceived latency for realistic workloads.

642 citations


Journal ArticleDOI
TL;DR: The paper presents the mechanisms that compose the new MAC: the basic RR-ALOHA protocol, an efficient broadcast service and the reservation of point-to-point channels that exploit parallel transmissions.
Abstract: Ad-hoc networking, though an attractive solution for many applications, still has many unsolved issues, such as the hiddenterminal problem, flexible and prompt access, QoS provisioning, and efficient broadcast service. In this paper we present a MAC architecture able to solve the above issues in environments with no power consumption limitations, such as networks for inter-vehicle communications. This new architecture is based on a completely distributed access technique, RR-ALOHA, capable of dynamically establishing, for each active terminal in the network, a reliable single-hop broadcast channel on a slotted/framed structure. Though the proposed architecture uses a slotted channel it can be adapted to operate on the physical layer of different standards, including the UMTS Terrestrial Radio Access TDD, and IEEE 802.11. The paper presents the mechanisms that compose the new MAC: the basic RR-ALOHA protocol, an efficient broadcast service and the reservation of point-to-point channels that exploit parallel transmissions. Some basic performance figures are discussed to prove the effectiveness of the protocol.

354 citations


Journal ArticleDOI
TL;DR: This paper discusses how a publish/subscribe system can be extended to operate in a mobile environment, where events can be generated by moving sensors or users, and subscribers can request delivery at handheld and/or mobile devices.
Abstract: A publish/subscribe system dynamically routes and delivers events from sources to interested users, and is an extremely useful communication service when it is not clear in advance who needs what information. In this paper we discuss how a publish/subscribe system can be extended to operate in a mobile environment, where events can be generated by moving sensors or users, and subscribers can request delivery at handheld and/or mobile devices. We describe how the publish/subscribe system itself can be distributed across multiple (possibly mobile) computers to distribute load, and how the system can be replicated to cope with failures, message loss, and disconnections.

301 citations


Journal ArticleDOI
TL;DR: This work has created two frameworks based on Jini (i.e., distributed Java objects) and Web Services to support the development of ubiquitous computing applications that make use of smart identification technology.
Abstract: We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe such technologies and their potential application areas, then give an overview of some of the applications we have developed. Based on the experience we have gained from developing these systems, we point out design concepts that we have found useful for structuring and implementing such applications. Building upon these concepts, we have created two frameworks based on Jini (i.e., distributed Java objects) and Web Services to support the development of ubiquitous computing applications that make use of smart identification technology. We describe our prototype frameworks, discuss the underlying concepts and present some lessons learned.

145 citations


Journal ArticleDOI
TL;DR: In this article, distributed power control is proposed as a means to improve the energy efficiency of routing algorithms in ad hoc networks, where each node estimates the power necessary to reach its own neighbors, and this power estimate is used both for tuning the transmit power (thereby reducing interference and energy consumption) and as the link cost for minimum energy routing.
Abstract: In this paper, distributed power control is proposed as a means to improve the energy efficiency of routing algorithms in ad hoc networks. Each node in the network estimates the power necessary to reach its own neighbors, and this power estimate is used both for tuning the transmit power (thereby reducing interference and energy consumption) and as the link cost for minimum energy routing. With reference to classic routing algorithms, such as Dijkstra and Link State, as well as more recently proposed ad hoc routing schemes, such as AODV, we demonstrate by extensive simulations that in many cases of interest our scheme provides substantial transmit energy savings while introducing limited degradation in terms of throughput and delay.

133 citations


Journal ArticleDOI
TL;DR: The calculations suggest that interference is upper-bounded in wireless ad-hoc networks that use carrier sensing for medium access control, and from the point of view of throughput optimization, show limits on the network size and input data rates per node.
Abstract: In this paper we propose a new model to calculate interference levels in wireless multi-hop ad-hoc networks. This model computes the expected value of Carrier to Interference ratio (C/I) by taking into account the number of nodes, density of nodes, radio propagation aspects, multi-hop characteristics of the network, and the amount of relay traffic. The expected values of C/I are used to determine network capacity and data throughput per node. Our model uses a regular lattice for possible locations of mobile nodes. This enables us to calculate the expected values of C/I, without having detailed information about movement patterns and exact location of all nodes at any moment. Based on this model we have evaluated effects of variations in the network size, network density and traffic load on C/I, and consequently throughput of the network. Our calculations suggest that interference is upper-bounded in wireless ad-hoc networks that use carrier sensing for medium access control. Further, from the point of view of throughput optimization, our calculations show limits on the network size and input data rates per node.

108 citations


Journal ArticleDOI
TL;DR: Simulation results indicate that the distributed medium access control protocol presented provides high channel utilization and bounded delays for real-time frames.
Abstract: Carrier sense multiple access and its variants have been widely used in mobile ad hoc networks. However, most existing access mechanisms cannot guarantee quality for real-time traffic. This paper presents a distributed medium access control protocol that provides multiple priority levels for stations to compete for the wireless channel. One common channel is assumed to be shared by all stations. Stations are assumed to be able to hear each other (i.e., the network is fully connected). The channel is accessed by stations according to their priorities, and for stations with the same priority, they send frames in a round robin manner. The channel access procedure is divided into three stages: priorities classification period, ID initialization period, and transmission period. Simulation results indicate that our protocol provides high channel utilization and bounded delays for real-time frames.

104 citations


Journal ArticleDOI
TL;DR: The design of a simple extensible meta-service discovery architecture that uses database techniques to unify service discovery protocols and addresses several of the key requirements of this paper.
Abstract: In this paper, we contend that ubiquitous computing environments will be highly heterogeneous, service rich domains. Moreover, future applications will consequently be required to interact with multiple, specialised service location and interaction protocols simultaneously. We argue that existing service discovery techniques do not provide sufficient support to address the challenges of building applications targeted to these emerging environments. This paper makes a number of contributions. Firstly, using a set of short ubiquitous computing scenarios we identify several key limitations of existing service discovery approaches that reduce their ability to support ubiquitous computing applications. Secondly, we present a detailed analysis of requirements for providing effective support in this domain. Thirdly, we provide the design of a simple extensible meta-service discovery architecture that uses database techniques to unify service discovery protocols and addresses several of our key requirements. Lastly, we examine the lessons learnt through the development of a prototype implementation of our architecture.

Journal ArticleDOI
TL;DR: This paper addresses the issues of supporting spatial queries (including window queries and kNN queries) of location-dependent information via wireless data broadcast and proposes a linear index structure based on the Hilbert curve and corresponding search algorithms to answer spatial queries on air.
Abstract: Owing to the advent of wireless networking and personal digital devices, information systems in the era of mobile computing are expected to be able to handle a tremendous amount of traffic and service requests from the users. Wireless data broadcast, thanks to its high scalability, is particularly suitable for meeting such a challenge. Indexing techniques have been developed for wireless data broadcast systems in order to conserve the scarce power resources in mobile clients. However, most of the previous studies do not take into account the impact of location information of users. In this paper, we address the issues of supporting spatial queries (including window queries and kNN queries) of location-dependent information via wireless data broadcast. A linear index structure based on the Hilbert curve and corresponding search algorithms are proposed to answer spatial queries on air. Experiments are conducted to evaluate the performance of the proposed indexing technique. Results show that the proposed index and its enhancement outperform existing algorithms significantly.

Journal ArticleDOI
TL;DR: A general, parameterized model for analyzing protocol control overhead in mobile ad-hoc networks and allows accurate predictions of which protocol will yield the lowest overhead depending on the node mobility and traffic activity pattern is proposed.
Abstract: This paper proposes a general, parameterized model for analyzing protocol control overhead in mobile ad-hoc networks. A probabilistic model for the network topology and the data traffic is proposed in order to estimate overhead due to control packets of routing protocols. Our analytical model is validated by comparisons with simulations, both taken from literature and made specifically for this paper. For example, our model predicts linearity of control overhead with regard to mobility as observed in existing simulations results. We identify the model parameters for protocols like AODV, DSR and OLSR. Our model then allows accurate predictions of which protocol will yield the lowest overhead depending on the node mobility and traffic activity pattern.

Journal ArticleDOI
TL;DR: A QoS-based mobile multicast routing protocol (QM2RP) that determines near-optimal routes on demand based on the multi-objective genetic algorithm (MOGA) and is fast and efficient in tackling dynamic multicast group membership information arising due to user mobility in wireless cellular networks.
Abstract: With the increasing demand for real-time services in next generation wireless networks, quality-of-service (QoS) based routing offers significant challenges. Multimedia applications, such as video conferencing or real-time streaming of stock quotes, require strict QoS guarantee on bandwidth and delay parameters while communicating among multiple hosts. These applications give rise to the need for efficient multicast routing protocols, which will be able to determine multicast routes that satisfy different QoS constraints simultaneously. However, designing such protocols for optimizing multiple objectives, is computationally intractable. Precisely, discovering optimal multicast routes is an NP-hard problem when the network state information is inaccurate - a common scenario in wireless networks. Based on the multi-objective genetic algorithm (MOGA), in this paper we propose a QoS-based mobile multicast routing protocol (QM2RP) that determines near-optimal routes on demand. Our protocol attempts to optimize multiple QoS parameters, namely end-to-end delay, bandwidth requirements, and residual bandwidth utilization. Furthermore, it is fast and efficient in tackling dynamic multicast group membership information arising due to user mobility in wireless cellular networks. Simulation results demonstrate that the proposed protocol is capable of discovering a set of QoS-based, near-optimal multicast routes within a few iterations, even with imprecise network information. Among these routes one can choose the best possible one depending on the specified QoS requirements. The protocol is also scalable and yields lower multicast call-blocking rates for dynamic multicast group size in large networks.

Journal ArticleDOI
TL;DR: The conditions under which cluster paging, a simple heuristic technique proposed for use with dynamic location update schemes, is optimal are shown and a polynomial time algorithm is presented for minimizing paging cost under the average delay constraint.
Abstract: In a high-capacity cellular network with limited spectral resources, it is desirable to minimize the radio bandwidth costs associated with paging when locating mobile users. Sequential paging, in which cells in the coverage area are partitioned into groups and paged in a non-increasing order of user location probabilities, permits a reduction in the average radio costs of paging at the expense of greater delay in locating the users. We present a polynomial time algorithm for minimizing paging cost under the average delay constraint, a problem that has previously been considered intractable. We show the conditions under which cluster paging, a simple heuristic technique proposed for use with dynamic location update schemes, is optimal. We also present analytical results on the average delay and paging cost obtained with sequential paging, including tight bounds.

Journal ArticleDOI
TL;DR: The first ns2-based comparative performance evaluation among four major solutions presented in the literature for forming multi-hop networks of Bluetooth devices (scatternet formation) and identifies protocol parameters and Bluetooth technology features that affect the duration of the formation process and the properties of the produced scatternets.
Abstract: This paper describes the results of the first ns2-based comparative performance evaluation among four major solutions presented in the literature for forming multi-hop networks of Bluetooth devices (scatternet formation). The four protocols considered in this paper are BlueTrees [1], BlueStars [2], BlueNet [3] and the protocol presented in [4] which proposes geometric techniques for topology reduction combined with cluster-based scatternet formation. We implemented the operations of the four protocols from device discovery to scatternet formation. By means of a thorough performance evaluation we have identified protocol parameters and Bluetooth technology features that affect the duration of the formation process and the properties of the produced scatternet. We have investigated how possible modifications of the BT technology (e.g., backoff duration, possibility for a BT inquirer to identify itself) make device discovery more efficient for scatternet formation in multi-hop networks. We have then discussed implementation concerns for each of the selected protocols. Finally, we have analyzed the protocols overhead as well as the effect of the different protocols operations on key metrics of the generated scatternets, which includes the time needed for forming a scatternet, the number of its piconets, the number of slaves per piconet, the number of roles assumed by each node and the scatternet route lengths.

Journal ArticleDOI
TL;DR: In this paper, trust-based recommendations control the exchange of personal information between handheld computers, and combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information.
Abstract: In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to roles in a Role-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.

Journal ArticleDOI
TL;DR: This paper proposes an original approach to maximize the network lifetime by determining the optimal assignment of nodes to cluster-heads, based on the minimum transmission power criterion.
Abstract: One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Thus, making good use of energy is a must in ad hoc networks. In this paper, we define as network lifetime the time period from the instant when the network starts functioning to the instant when the first network node runs out of energy. Our objective is to devise techniques to maximize the network lifetime in the case of cluster-based systems, which represent a significant sub-set of ad hoc networks. Cluster-based ad hoc networks comprise two types of nodes: cluster-heads and ordinary nodes. Cluster-heads coordinate all transmissions from/to ordinary nodes and forward all traffic in a cluster, either to other nodes in the cluster or to other cluster-heads. In this case, to prolong the network lifetime we must maximize the lifetime of the cluster-heads because they are the critical network element from the energy viewpoint. We propose an original approach to maximize the network lifetime by determining the optimal assignment of nodes to cluster-heads. Given the number of cluster-heads, the complexity of the proposed solution grows linearly with the number of network nodes. The network topology is assumed to be either static or slowly changing. Two working scenarios are considered. In the former, the optimal network configuration from the energy viewpoint is computed only once; in the latter, the network configuration can be periodically updated to adapt to the evolution of the cluster-heads energy status. In both scenarios, the presented solution greatly outperforms the standard assignment of nodes to cluster-heads, based on the minimum transmission power criterion.

Journal ArticleDOI
TL;DR: This paper shows how online management of both quality of service (QoS) and provider revenue can be performed in CDMA cellular networks by adaptive control of system parameters to changing traffic conditions by introducing a novel call admission control and bandwidth degradation scheme for real-time traffic and the development of a Markov model for the admission controller.
Abstract: In this paper, we show how online management of both quality of service (QoS) and provider revenue can be performed in CDMA cellular networks by adaptive control of system parameters to changing traffic conditions. The key contribution is the introduction of a novel call admission control and bandwidth degradation scheme for real-time traffic as well as the development of a Markov model for the admission controller. This Markov model incorporates important features of 3G cellular networks, such as CDMA intra- and intercell interference, different call priorities and soft handover. From the results of the Markov model the threshold for maximal call degradation is periodically adjusted according to the currently measured traffic in the radio access network. As a consequence, QoS and revenue measures can be optimized with respect to a predefined goal. To illustrate the effectiveness of the proposed QoS/revenue management approach, we present quantitative results for the Markov model and a comprehensive simulation study considering a half-day window of a daily usage pattern.

Journal ArticleDOI
TL;DR: This paper proposes a hierachical architecture integrating Mobile IP and OLSR, a routing protocol for ad-hoc networks, to manage universal mobility, and shows how the brodcast of Mobile-IP Agent Advertisement can be optimized using O LSR MPR-flooding.
Abstract: Trends in fourth generation (4G) wireless networks are clearly identified by the full-IP concept where all traffic (data, control, voice and video services, etc.) will be transported in IP packets. Many proposals are being made to enhance IP with the functionalities necessary to manage the mobility of nodes, so that networks can provide global seamless roaming between heterogeneous wireless and wired networks. In this paper, we focus on the management of universal mobility, including both large scale macro-mobility and local scale micro-mobility. We propose a hierachical architecture (i) extending micro-mobility management of a wireless access network to an ad-hoc access network, (ii) connecting this ad-hoc network to the Internet and (iii) integrating Mobile IP and OLSR, a routing protocol for ad-hoc networks, to manage universal mobility. This architecture is validated by an implementation based on DynamicsMobile-IP and OLSR version 7. We show how the brodcast of Mobile-IP Agent Advertisement can be optimized using OLSR MPR-flooding.

Journal ArticleDOI
TL;DR: This paper presents the first analytical model to derive the saturation throughput of collision avoidance protocols in multi-hop ad hoc networks with nodes randomly placed according to a two-dimensional Poisson distribution and shows that the sender-initiated collision-avoidance scheme achieves much higher throughput than the ideal carrier sense multiple access scheme with a separate channel for acknowledgments.
Abstract: Although there has been considerable work on the performance evaluation of collision avoidance schemes, most analytical work is confined to single-hop ad hoc networks or networks with very few hidden terminals. We present the first analytical model to derive the saturation throughput of collision avoidance protocols in multi-hop ad hoc networks with nodes randomly placed according to a two-dimensional Poisson distribution. We show that the sender-initiated collision-avoidance scheme achieves much higher throughput than the ideal carrier sense multiple access scheme with a separate channel for acknowledgments. More importantly, we show that the collision-avoidance scheme can accommodate much fewer competing nodes within a region in a network infested with hidden terminals than in a fully-connected network, if reasonable throughput is to be maintained. Simulations of the IEEE 802.11 MAC protocol and one of its variants validate the predictions made in the analysis. It is also shown that the IEEE 802.11 MAC protocol cannot ensure collision-free transmission of data packets and thus throughput can degrade well below what is predicted by the analysis of a correct collision avoidance protocol. Based on these results, a number of improvements are proposed for the IEEE 802.11 MAC protocol.

Journal ArticleDOI
TL;DR: This paper outlines an approach, centered on the Bluetooth technology, to support a sensor network composed of fixed wireless sensors for health monitoring of highways, bridges and other civil infrastructures and presents a topology formation scheme that not only takes into account the traffic generated by different sensors but also the associated link strengths, buffer capacities and energy availability.
Abstract: Communicating with sensors has long been limited either to wired connections or to proprietary wireless communication protocols. Using a ubiquitous and inexpensive wireless communication technology to create Sensor Area Networks (SANs) will accelerate the extensive deployment of sensor technology. Bluetooth, an emerging, worldwide standard for inexpensive, local wireless communication is a viable choice for SANs because of its inherent support for some of the important requirements-low power, small form factor, low cost and sufficient communication range. In this paper we outline an approach, centered on the Bluetooth technology, to support a sensor network composed of fixed wireless sensors for health monitoring of highways, bridges and other civil infrastructures. We present a topology formation scheme that not only takes into account the traffic generated by different sensors but also the associated link strengths, buffer capacities and energy availability. The algorithm makes no particular assumptions as to the placement of nodes, and not all nodes need to be in radio proximity of each other. The output is a tree shaped scatternet rooted at the sensor hub (data logger) that is balanced in terms of traffic carried on each of the links. We also analyze the scheduling, routing and healing aspects of the resulting sensor-net topology.

Journal ArticleDOI
TL;DR: Analysis of the node spatial distribution of mobile wireless ad hoc networks has shown that in Brownian-like motion the uniformity assumption does hold, and that the intensity of the concentration of nodes in the center of the deployment region that occurs in the random waypoint model heavily depends on the choice of some mobility parameters.
Abstract: In this paper, we analyze the node spatial distribution of mobile wireless ad hoc networks. Characterizing this distribution is of fundamental importance in the analysis of many relevant properties of mobile ad hoc networks, such as connectivity, average route length, and network capacity. In particular, we have investigated under what conditions the node spatial distribution resulting after a large number of mobility steps resembles the uniform distribution. This is motivated by the fact that the existing theoretical results concerning mobile ad hoc networks are based on this assumption. In order to test this hypothesis, we performed extensive simulations using two well-known mobility models: the random waypoint model, which resembles intentional movement, and a Brownian-like model, which resembles nonintentional movement. Our analysis has shown that in Brownian-like motion the uniformity assumption does hold, and that the intensity of the concentration of nodes in the center of the deployment region that occurs in the random waypoint model heavily depends on the choice of some mobility parameters. For extreme values of these parameters, the uniformity assumption is impaired.

Journal ArticleDOI
TL;DR: It is shown that the link level performance of a wireless video transmission system can be modeled by a DBMAP/PH/1 priority queue, and computation algorithm and numerical results for the queueing model are presented.
Abstract: With the scalability and flexibility of the MPEG-4 and the emergence of the broadband wireless network, wireless multimedia services are foreseen to become deployed in the near future. Transporting MPEG-4 video over the broadband wireless network is expected to be an important component of many emerging multimedia applications. One of the critical issues for multimedia applications is to ensure that the quality-of-service (QoS) requirement to be maintained at an acceptable level. This is further challenged in that such a service guarantee must be achieved under unreliable and time-varying wireless channels. In this paper we study the link level performance of MPEG-4 video transmission over the uplink of an unreliable wireless channel. We introduce the discrete time batch Markovian arrival process (DBMAP) with two types of arrivals to model the MPEG-4 video source, which takes into account the inherent nature of the adaptiveness of the video traffic. We prove that in a hidden Markov modeled (HMM) wireless channel with probabilistic transmission, the service time for an arbitrary radio link control (RLC) burst follows phase type (PH-type) distribution. We show that the link level performance of a wireless video transmission system can be modeled by a DBMAP/PH/1 priority queue, and present computation algorithm and numerical results for the queueing model. Extensive simulations are carried out on the queueing behavior of the video transmission buffer, as well as on the packet level error behavior of the video data. The results demonstrate that video quality can be substantially improved by preserving the high priority video data during the transmission.

Journal ArticleDOI
TL;DR: This paper addresses the performance issues of mobile nearest-neighbor search, in which the mobile user issues a query to retrieve stationary service objects nearest to him/her, and proposes a semantic cache to enhance the access efficiency of the service.
Abstract: Location-based services have received increasing attention in recent years. In this paper, we address the performance issues of mobile nearest-neighbor search, in which the mobile user issues a query to retrieve stationary service objects nearest to him/her. An index based on Voronoi Diagram is used in the server to support such a search, while a semantic cache is proposed to enhance the access efficiency of the service. Cache replacement policies tailored for the proposed semantic cache are examined. Moreover, several query scheduling policies are proposed to address the inter-cell roaming issues in multi-cell environments. Simulations are conducted to evaluate the proposed methods. The result shows that the system performance, in terms of cache hit ratio, query response time, cell-cross number and cell-recross number, is improved significantly.

Journal ArticleDOI
Sang-Ho Park1, Daeyeon Park1
TL;DR: The enhanced adaptivity minimizes the core dependency and improves performance and robustness of ACMRP, which can achieve efficiency, scalability, and effectiveness in ad hoc networks.
Abstract: The Adaptive Core Multicast Routing Protocol (ACMRP) is proposed for multicast routing in ad hoc networks. ACMRP is on demand core-based multicast routing protocol that is based on a multicast mesh. In ACMRP, a core is not well-known and it adapts to the current network topology and group membership. The enhanced adaptivity minimizes the core dependency and, accordingly, improves performance and robustness of ACMRP. A multicast mesh is created and maintained by the periodic flooding of the adaptive core. Since the flooding traffic is evenly maintained and a mesh provides rich connectivity among group members, ACMRP can achieve efficiency, scalability, and effectiveness. We evaluate scalability and performance of ACMRP via simulation.

Journal ArticleDOI
TL;DR: Simulation results indicate that the employment of indexing scheme and proper scheduling of object retrieval along the parallel channels drastically reduces both the access latency and power consumption at the mobile unit.
Abstract: Our interest in the global information sharing process is motivated by the advances in communication and computation technologies, the marriage between the two technologies, and the almost limitless amount of information available on the network. Within the scope of the global information sharing process, when a user's request (potentially mobile) is directed to public data, broadcasting has been suggested as an effective mechanism to access data. The effectiveness of the schemes to retrieve public data is determined by their ability to reduce the access latency and power consumed by the mobile unit. Various indexing techniques can be used to further improve the effectiveness of retrieving broadcast data.This paper addresses the application of object indexing in parallel broadcast channels. In addition, to further reduce access latency, it proposes several scheduling schemes to order accesses to the data objects on parallel channels. The proposed schemes are simulated, and analyzed. Our simulation results indicate that the employment of indexing scheme and proper scheduling of object retrieval along the parallel channels drastically reduces both the access latency and power consumption at the mobile unit.

Journal ArticleDOI
TL;DR: It is shown that the proposed mechanism that allows fast route repair in on demand ad hoc routing protocols reduces the connection disruption probability as well as the frequency of broadcasts and is applied to the Ad hoc On-demand Distance Vector routing protocol.
Abstract: Ad hoc routing protocols that use broadcast for route discovery may be inefficient if the path between any source-destination pair is frequently broken We propose and evaluate a simple mechanism that allows fast route repair in on demand ad hoc routing protocols We apply our proposal to the Ad hoc On-demand Distance Vector (AODV) routing protocol The proposed system is based on the Controlled Flooding (CF) framework, where alternative routes are established around the main original path between source-destination pairs With alternative routing, data packets are forwarded through a secondary path without requiring the source to re-flood the whole network, as may be the case in AODV We are interested in one-level alternative routing We show that our proposal reduces the connection disruption probability as well as the frequency of broadcasts

Journal ArticleDOI
TL;DR: In this article, the authors present an admission control policy and a post-admission policing mechanism at the node-level to maximize the useful work done (i.e., maximize user rewards).
Abstract: Energy related research in wireless ad hoc sensor networks (WASNs) is focusing on energy saving techniques in the application-, protocol-, service-, or hardware-level. Little has been done to manage the finite amount of energy for a given (possibly optimally-designed) set of applications, protocols and hardware. Given multiple candidate applications (i.e., distributed algorithms in a WASN) of different energy costs and different user rewards, how does one manage a finite energy amount? Where does one provide energy, so as to maximize the useful work done (i.e., maximize user rewards)? We formulate the problem at the node-level, by having system-level "hints" from the applications. In order to tackle the central problem we first identify the energy consumption patterns of applications in WASNs, we propose ways for real-time measurements of the energy consumption by individual applications, and we solve the problem of estimating the extra energy consumption that a new application brings to a set of executing applications. Having these tools at our disposal, and by properly abstracting the problem we present an optimal admission control policy and a post-admission policing mechanism at the node-level. The admission policy can achieve up to 48% increase in user rewards compared to the absence of energy management, for a variety of application mixes.

Journal ArticleDOI
TL;DR: It is seen that the use of ECN & ELFN does yield higher goodput in most cases with a corresponding lower total energy cost and an energy savings of between 20% and 500% depending on the network conditions.
Abstract: In this paper we study the energy cost (protocol processing and communication cost) and goodput of different flavors of TCP (Transmission Control Protocol) in ad hoc networks. We implemented a testbed and measured the actual energy cost as well as goodput of running TCP Reno, Newreno, SACK (Selective ACKnowledgement) and a version that combines Explicit Link Failure Notification (ELFN) [7] and Explicit Congestion Notification (ECN) [5] in Newreno. We see that the use of ECN & ELFN does yield higher goodput in most cases with a corresponding lower total energy cost. We see an energy savings of between 20% and 500% depending on the network conditions.