• Title/Summary/Keyword: idle nodes

Search Result 49, Processing Time 0.023 seconds

An Efficient Multi-Channel MAC Protocol for Cognitive Ad-hoc Networks with Idle Nodes Assistance (무선 인지 애드 혹 네트워크를 위한 휴지 노드를 활용하는 효율적인 다중 채널 MAC 프로토콜)

  • Gautam, Dinesh;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.39-45
    • /
    • 2011
  • In this paper, we propose an efficient multichannel MAC protocol with idle nodes assistance to avoid the multi-channel hidden terminal problem in cognitive radio ad hoc network and further to improve the performance of the network. The proposed MAC protocol can be applied to the cognitive radio adhoc network where every node is equipped with the single transceiver and one common control channel exists for control message negotiation. In the proposed protocol, the idle nodes available in the neighbour of communication nodes are utilized because the idle nodes have the information about the channels being utilized in their transmission range. Whenever the nodes are negotiating for the channel, idle nodes can help the transmitting and receiving nodes to select the free data channel for data transfer. With the proposed scheme, we can minimize the hidden terminal problem and decrease the collision between the secondary users when selecting the channel for data transfer. As a result, the performance of the network is increased.

Energy Saving in Cluster-Based Wireless Sensor Networks through Cooperative MIMO with Idle-Node Participation

  • Fei, Li;Gao, Qiang;Zhang, Jun;Wang, Gang
    • Journal of Communications and Networks
    • /
    • v.12 no.3
    • /
    • pp.231-239
    • /
    • 2010
  • In cluster-based wireless sensor networks, the energy could be saved when the nodes that have data to transmit participate in cooperative multiple-input multiple-output (MIMO). In this paper, by making the idle nodes that have no data to transmit participate in the cooperative MIMO, it is found that much more energy could be saved. The number of the idle nodes that participate in the cooperative MIMO is optimized to minimize the total energy consumption. It is also found that the optimal number of all the nodes participating in cooperative communication does not vary with the number of nodes that have data to transmit. The proposition is proved mathematically. The influence of long-haul distance and modulation constellation size on the total energy consumption is investigated. A cooperative MIMO scheme with help-node participation is proposed and the simulation results show that the proposed scheme achieves significant energy saving.

Discrete-Time Gaussian Interfere-Relay Channel

  • Moon, Kiryang;Yoo, Do-Sik;Oh, Seong-Jun
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.299-310
    • /
    • 2016
  • In practical wireless relay communication systems, non-destination nodes are assumed to be idle not receiving signals while the relay sends messages to a particular destination node, which results in reduced bandwidth efficiency. To improve the bandwidth efficiency, we relax the idle assumption of non-destination nodes and assume that non-destination nodes may receive signals from sources. We note that the message relayed to a particular node in such a system gives rise to interference to other nodes. To study such a more general relay system, we consider, in this paper, a relay system in which the relay first listens to the source, then routes the source message to the destination, and finally produces interference to the destination in sending messages for other systems. We obtain capacity upper and lower bounds and study the optimal method to deal with the interference as well as the optimal routing schemes. From analytic results obtained, we find the conditions on which the direct transmission provides higher transmission rate. Next, we find the conditions, by numerical evaluation of the theoretical results, on which it is better for the destination to cancel and decode the interference. Also we find the optimal source power allocation scheme that achieves the lower bound depending on various channel conditions. We believe that the results provided in this paper will provide useful insights to system designers in strategically choosing the optimal routing algorithms depending on the channel conditions.

A Study on Performance Evaluation of Energy-Constrained Open-Loop Cooperative Sensing in Cognitive Radios (인지 무선 통신 시스템에서 에너지 제한적 개방 루프 협력 센싱 기법에 대한 연구)

  • Noh, Gosan;Lim, Sungmook;Wang, Hanho
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.1
    • /
    • pp.34-39
    • /
    • 2014
  • In cognitive radios, secondary users can use the spectrum exclusively allocated to a primary wireless system if the secondary users detect the spectrum in idle states. Because the secondary users can utilize the idle state of the spectrum, the utilization rate of the spectrum can be improved. The idle states can be detected by using secondary users' sensing schemes. However, the wireless channel environment where secondary users perform the spectrum sensing is not very friendly to secondary users because the signal-to-noise ratio of the received primary signal is very low. Hence, cooperative sensing scheme where more than one secondary user take part in the spectrum sensing is generally used in cognitive radios. In this paper, we investigate the cooperative sensing performance for machine-to-machine communication devices operated by batteries with limited energy. In general, the energy consumed for the spectrum sensing increases as the length of the sensing period and the number of cooperative sensing nodes. Accordingly, even though the total amount of the consumed energy is the same, an energy allocation methodology how to distribute the energy to the sensing period and sensing nodes can achieve the optimum sensing performance, which is numerically analyzed.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

A Developed Collision Resolution Algorithm in MAC Protocol for IEEE 802.11b Wireless LANs (ICEIC'04)

  • Chung Kyung Taek;Pan Ce;Park Hyun;Kim Byun Gon;Chon Byoung Sil
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.681-685
    • /
    • 2004
  • Design of efficient Medium Access Control (MAC) protocols with both high throughput performances is a major focus in distributed contention-based MAC protocol research. In this paper, we propose an efficient contention-based MAC protocol for wireless Local Area Networks, namely, the Developed Collision Resolution (DCR) algorithm. This algorithm is developed based on the following innovative ideas: to speed up the collision resolution, we actively redistribute the backoff timers for all active nodes; to reduce the average number of idle slots, we use smaller contention window sizes for nodes with successful packet transmissions and reduce the backoff timers exponentially fast when a fixed number of consecutive idle slots are detected. We show that the proposed DCR algorithm provides high throughput performance and low latency in wireless LANs.

  • PDF

Throughput Analysis of Power Management Scheme of IEEE 802.11 DCF in Wireless Ad Hoc Networks (무선 ad hoc 네트워크에서 IEEE 802.11의 power management scheme에 관한 성능 분석)

  • Lee, Kam-Rok;Kwon, Wook-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.61-62
    • /
    • 2006
  • In this paper, using Bianchi's model with channel idle probability we analyze performance of power management scheme of IEEE 802.11 DCF according to ATIM window size and number of nodes for wireless ad hoc networks. The analytical results show that, when the number of nodes is given, the selected ATIM window size limits the performance.

  • PDF

IP Paging with an Adaptive Active Timer in Mobile IPv6 (Mobile IPv6상에서 적응적 액티브 타이머를 고려한 IP 페이징)

  • 이보경
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.482-489
    • /
    • 2004
  • Paging extensions for Mobile IP was proposed to avoid unnecessary registration signaling overhead of Mobile IP. In order to support the paging function in Mobile IP, the slates of a mobile node arc divided into active on, active off, idle. The active on state means when any incoming or outgoing data session arrives to a mobile node. After data session is completed, the state of the motile node is changed into active off from active on. At this moment, the active timer starts to be operated. If the active timer expires, the mobile node moves to idle state. If a mobile node has very frequently data sessions at the same cell, the mobile node is better to move slowly into idle state. The other way, if the mobile node very frequently moves into new cell area and receives or sends little data, the mobile node is better to move earlier into idle state. In this raper, the active timer is adaptively set by the mobile nodes traffic and mobility characteristics and the paging scheme using this active timer is proposed to reduce the location registration cost.

Reduced-Pipelined Duty Cycle MAC Protocol (RP-MAC) for Wireless Sensor Network

  • Nguyen, Ngoc Minh;Kim, Myung Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2433-2452
    • /
    • 2017
  • Recently, the pipeline-forwarding has been proposed as a new technique to resolve the end-to-end latency problem of the duty-cycle MAC protocols in Wireless Sensor Networks (WSNs). Some protocols based on this technique such as PMAC and PRI-MAC have shown an improvement not only in terms of reducing end-to-end latency but also in terms of reducing power consumption. In these protocols, however, the sensor nodes still waste a significant amount of energy for unnecessary idle listening during contention period of upstream nodes to check the channel activity. This paper proposes a new pipeline-forwarding duty-cycle MAC protocol, named RP-MAC (Reduced Pipelined duty-cycle MAC), which tries to reduce the waste of energy. By taking advantage of ACK mechanism and shortening the handshaking procedure, RP-MAC minimizes the time for checking the channel and therefore reduces the energy consumption due to unnecessary idle listening. When comparing RP-MAC with the existing solution PRI-MAC and RMAC, our QualNet-based simulation results show a significant improvement in term of energy consumption.

Dynamic Slot Allocation Scheme in Tactical Multi-hop Networks for Future Soldier Systems (개인전투체계 다중홉 네트워크를 위한 동적 시간슬롯 할당 기법)

  • Lee, Jongkwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.115-122
    • /
    • 2021
  • In this paper, we propose a dynamic slot allocation scheme to improve the slot utilization rate in tactical multi-hop networks in which the channel condition varies due to node movements. The proposed scheme takes advantage of the fact that nodes that are more than three hops apart can use the same slot simultaneously. The frame is divided into two parts: the control period and the data period. To know the available slot information within two-hop distance, the node exchanges a slot allocation information with one-hop neighbors during the control period. The node can get the information on idle slots that are not used within two-hop distance but assigned already to other nodes that are more than three-hop away. The identified idle slot can be used by the node, which increases the slot utilization rate. The performance analysis results of the proposed scheme show that it increases the slot utilization rate sufficiently despite the overhead of the control period in the multi-hop networks of the future soldier system.