Exclusion and Guard Zones in DC-CDMA Ad Hoc Networks
نویسندگان
چکیده
The central issue in direct-sequence code-division multiple-access (DS-CDMA) ad hoc networks is the prevention of a near-far problem. This paper considers two types of guard zones that may be used to control the near-far problem: a fundamental exclusion zone and an additional CSMA guard zone that may be established by the carrier-sense multiple-access (CSMA) protocol. In the exclusion zone, no mobiles are physically present, modeling the minimum physical separation among mobiles that is always present in actual networks. Potentially interfering mobiles beyond a transmitting mobile’s exclusion zone, but within its CSMA guard zone, are deactivated by the protocol. This paper provides an analysis of DS-CSMA networks with either or both types of guard zones. A network of finite extent with a finite number of mobiles and uniform clustering as the spatial distribution is modeled. The analysis applies a closed-form expression for the outage probability in the presence of Nakagami fading, conditioned on the network geometry. The tradeoffs between exclusion zones and CSMA guard zones are explored for DS-CDMA and unspread networks. The spreading factor and the guard-zone radius provide design flexibility in achieving specified levels of average outage probability and transmission capacity. The advantage of an exclusion zone over a CSMA guard zone is that since the network is not thinned, the number of active mobiles remains constant, and higher transmission capacities can be achieved.
منابع مشابه
Energy-efficient MAC layer protocols in ad hoc networks
3 Scheduling-based mechanism 8 3.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2 CDMA ad hoc networks . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.2.1 CDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.2.2 CDMA ad hoc networks . . . . . . . . . . . . . . . . . . . . . 11 3.3 TDMA . . . . . . . . . . . . . . . . . . . . . . . . . . ...
متن کاملImproving Performance of Opportunistic Routing Protocol using Fuzzy Logic for Vehicular Ad-hoc Networks in Highways
Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing protocol seems necessary. Given the fact that a road is crowded at some sections and is not c...
متن کاملAssessment of DSACC and QPART Algorithms in Ad Hoc Networks
The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...
متن کاملSurvey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1304.5304 شماره
صفحات -
تاریخ انتشار 2013