Incidence Rates Calculations in Wireless Mobile Delay-Tolerant Networks
نویسندگان
چکیده
We present the calculations of the incidence rates used in [1]. I. GENERAL CASE With respect to the main text, here we assume that χ ∈ [θ, θ + 2π] instead of χ ∈ [−π, π]. This is adopted for reasons of mathematical convenience, as we show later on. As all incidence rates are periodic, with a period 2π, with respect to χ, this assumption is not in any way restrictive. We expand the description of the forwarding region F that appears in [1] as follows: We use two functions r(φ), p(φ). The function r(φ) is such that (r(φ), φ) traces the boundary of F , in polar coordinates, whereas p(φ) is the angle formed between the positive x-axis and the vector that is perpendicular to the boundary of F at the location (r(φ), φ). We assume that r(φ) is continuous and p(φ) is increasing in φ (but not necessarily continuous). Although it would suffice to define r(φ) and p(φ) for φ ∈ [−π, π], for mathematical convenience we define them for φ ∈ R, therefore r(φ) is periodic (with period 2π). We also require that p(φ+ 2π) = p(φ) + 2π for all φ ∈ R. Also, let x1 and x2, with x1 < x2, be the locations on the x-axis where F intersects it. We have also assumed that x0 ≤ x1. Finally, let y1(x) and y2(x) be the functions describing the boundary of F below and above the x-axis respectively, in Cartesian coordinates. All these quantities we use to describe F appear in Fig. 1. A. Calculation of γ(χ, φ; θ) Note that the relative speed with which a node B with direction χ moves, as viewed by F , is, using phasor notation, vne jχ − vne = vne + vne = 2vn exp ( j [ χ+ θ + π 2 ]) × exp ( j [ χ−θ−π 2 ]) + exp ( j [ θ+π−χ 2 ])
منابع مشابه
Energy-Aware Probabilistic Epidemic Forwarding Method in Heterogeneous Delay Tolerant Networks
Due to the increasing use of wireless communications, infrastructure-less networks such as Delay Tolerant Networks (DTNs) should be highly considered. DTN is most suitable where there is an intermittent connection between communicating nodes such as wireless mobile ad hoc network nodes. In general, a message sending node in DTN copies the message and transmits it to nodes which it encounters. A...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کامل3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...
متن کاملپروتکل مسیریابی خودتطبیقی با محدوده تأخیر برای شبکه های موردی بین خودرویی
Abstract Vehicular Ad Hoc Network (VANET) is a particular type of mobile ad hoc network in which vehicles communicate between themselves using wireless antenna. Due to unique characteristics of VANETs (e.g. high mobility of nodes and dynamic topology), routing is one of the challenging tasks in such networks. Consequently, delay tolerant networks which consider the disconnect nature of...
متن کاملAn Energy Efficient Clustering Method using Bat Algorithm and Mobile Sink in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of sensor nodes with limited energy. Energy efficiency is an important issue in WSNs as the sensor nodes are deployed in rugged and non-care areas and consume a lot of energy to send data to the central station or sink if they want to communicate directly with the sink. Recently, the IEEE 802.15.4 protocol is employed as a low-power, low-cost, and low rat...
متن کاملImproving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014