Preview

Wireless Networks

Powerful Essays
Open Document
Open Document
8002 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Networks
line 1. INTRODUCTION

Wireless ad hoc networks have emerged to support applications, in which it is required/desired to have wireless variety of devices without relying on communications among a any infrastructure or central management. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those within its transmission range (i.e., its neighbours) and requires other nodes to act as routers in order to communicate with out-of-range destinations.
One of the fundamental operations in wireless ad hoc net- works is broadcasting, where a node disseminates a message to all other nodes in the network. This can be achieved through flooding , in which every node transmits the message after receiving it for the first time. However, it can impose a large number of redundant transmissions, which can result in significant waste of constrained resources such as bandwidth and power. In general, not every node is required to forward/transmit the message in order to deliver it to all nodes in the network. A set of nodes form a Dominating Set (DS) if every node in the network is either in the set or has a neighbour in the set. A DS is called a Connected Dominating Set (CDS) if the sub-graph induced by its nodes is connected. Clearly, the forwarding nodes, together with the source node, form a CDS. On the other hand, any CDS can be used for broadcasting a message (only nodes in the set are required to forward). Therefore, the problems of finding the minimum number of required transmissions (or forwarding nodes) and finding a Minimum Connected Dominating Set (MCDS) can be reduced to each other. Unfortunately, finding a MCDS (and hence minimum number of forwarding nodes) was proven to be NP hard even when the whole network topology is known [1], [2]. A desired objective of many efficient broadcast algorithms is to reduce the total number of transmissions to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It would take 3 (hop) messages to send a message from node D to node A. One additional link would be required to add a new node E between node C and node B. The added node E will increase the number of actual messages required to be sent form one node to another.…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As we have seen that, for a wireless sensor networks, to determine the optimal number of sinks needed to meet a certain performance is very difficult task. As it depends on various metrics that was discussed in earlier chapters. We try to show that it is a function of hop-limit, K-covered, transmission range and area of the network.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1 Which statements are true concerning the shared memory buffering used by an Ethernet switch? (Choose two.)…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Given $U$ as the set all the devices located at the edge of the network with physical proximity of the device that wants to request computational resources $D$. Therefore, the PAR problem can be modeled as a graph $G$, where the vertexes of this graph are elements of the set U, and the edges of G are the communication link between them. In our approach, the vertexes are classified according to into the following types:…

    • 232 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Cordeiro, C., Gossain, H., and Agrawa, D. "Multicast over wireless mobile ad hoc networks: present and future directions", IEEE Network, 17(1), 2003.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    We declare that the this project proposal report or part of it was not a copy of a document done by any organization, university, any other institute or a previous student project group at SLIIT and was not copied from the Internet or other sources.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    IT321 Final Exam Paper

    • 1235 Words
    • 5 Pages

    40. (T or F) Broadcast routing is used in most networks so that users don’t need to remember other users’ network addresses.…

    • 1235 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Satisfactory Essays

    Pre-Lab Computer Questions

    • 6462 Words
    • 26 Pages

    The spanning tree protocol prevents forwarding loops from occurring by organizing the bridges in a spanning tree topology, and by blocking certain bridge ports.…

    • 6462 Words
    • 26 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    A network redundant topology where nodes are connected using two concentric rings with four branches.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    We focus our attention on unweighted and undirected networks here. A complex network is represented by G(V,E) where V is the vertex set and E is the edge set. Each node v(v∈V) has a label C(v) and N(v) is the set of neighbors of node . The label propagation algorithm (LPA) first initializes every node with a unique label. Then at every step each node updates its current label to the label shared by the maximum number of its neighbors. The formula is as follows [14]:…

    • 480 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    16. Define hop count.The number of routers the data packet must pass through to reach the destination network…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Networks

    • 1176 Words
    • 5 Pages

    your response to the following: Imagine you are the network administrator of aWLAN. Give an example of how knowing the 10’s and 3’s Rules of RF Math can helpyou on the job. Include your answers to Case Project 3-5 in your response. Show your work…

    • 1176 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Wireless Signals

    • 551 Words
    • 3 Pages

    Wireless signals are all around us as we walk or drive around the city or town where we live. The four types of wireless technologies that are out there are Wi-Fi, Cellular, Bluetooth, and WiMAX. We will be looking at these types of wireless technologies a little more in depth, where are they most commonly used, and how they differ from one another. The first wireless technology that we will be looking at is the Wi-Fi wireless signal. The Wi-Fi signal is mainly associated with computer networking, the specification used to create a wireless local area network is the IEEE 802.11. One would use this type of wireless technology if you were a business owner opening up a coffee shop and needed a public network. The network would have a wired connection to an internet source, then leading to a wireless router that transmits and receives the data from all of the customer’s devices that want to use the Wi-Fi. This will also connect all of the devices to one another through the network. The next type of wireless technology that we will be looking at is Cellular. This type of wireless technology is most often associated with wireless telephones. The cellular network is connected to cells that will enable a user to move around freely while staying connected to the network. This type of signal is used everywhere you go nowadays and are used by everyone. There are a multitude of devices that use these networks at one time and those include, smart phones, tablets, and some computers can use the cell towers to get a signal to be able to use the internet. The first generation of cellular signals was completely analog, and from there with the growing demand of faster speeds and better connectivity technology brought us 2G, 3G, and the ever popular 4G phones. Bluetooth is the next technology that we will touch on and is very similar to the Wi-Fi and cellular networks but on…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    References: [1] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, ”Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior,” IEEE Trans. Info. Theory, vol. 50, no. 12, Dec. 2004, pp. 3062–80. [2] M. Peng and W. Wang, ”Technologies and Standards for TD-SCDMA Evolutions to IMT-Advanced,” IEEE Commun. Mag., vol. 47, issue 12, Dec. 2009, pp. 50–58. [3] R1-091632 et al., ”Type 2 Relaying Frame-Work Definition,” 3GPP TSG RAN WG1 Meeting #56bis, Seoul, Korea, 23–27 Mar. 2009. [4] R. Ahlswede et al., ”Network Information Flow,” IEEE Trans. Info. Theory, vol. 46, no. 4, July 2000, pp. 1204–16. [5] S.-Y. R. Li, R. W. Yeung, and N. Cai, “Linear Network Coding,” IEEE Trans. Info. Theory, vol. 49, Feb. 2003, pp. 371–81. [6] R. Koetter and M. Medard, ”An Algebraic Approach to Network Coding,” IEEE/ACM Trans. Net., vol. 11, no. 5, Oct. 2003, pp. 782–95. [7] T. Ho et al., ”A Random Linear Network Coding Approach to Multicast,” IEEE Trans. Info. Theory, vol. 52, no. 10, Oct. 2006, pp. 4413–30. [8] C. Fragouli, J. Widmer, and J.-Y. L. Boudec, ”Efficient Broadcasting Using Network Coding,” IEEE/ACM Trans. Net., vol. 16, no. 2, Apr. 2008, pp. 450–63. [9] R1-082327, ”Application of Network Coding in LTEAdvanced Relay,” 3GPP TSG-RAN WG1 #53b, Warsaw, Poland, June 30–July 4, 2008. [10] S. Zhang, S.-C. Liew, and P. P. Lam, ”On the Synchro-…

    • 7151 Words
    • 29 Pages
    Powerful Essays