Study and Analysis of the Capacity of Ad Hoc Wireless Networks using Mobility and Delay
نویسندگان
چکیده
with a cellular architecture of base stations, it is investigated that each wireless node can be realized with a throughput that By employing a practical and simple routing policy to study and analyse the capacity u s i n g m o b i l i t y and delay of an ad-hoc wireless network and consisting of static wireless nodes overlaid scales sub linearly or linearly with ., The analysis shows that one requires a large deployment cost in order to achieve a Θ(1) capacity. Existing research works also indicate that for pure mobile ad hoc networks, a capacity of Θ(1) can be achieved by exploiting the mobility of the nodes, at the expense of very high end-to-end delay. This larger delay, nevertheless, stems from the assumption of global mobility, where nodes move around the entire network. B y leveraging a more practical and restricted mobility model, i t i s a n a l y s e d the capacity using mobility and delay ad-hoc wireless network design with mobile nodes and base stations, termed as mobile hybrid wireless network. This r e s u l t s show that each node can be realized with a capacity of Θ (1), w h i l e keeping the average end-to-end delay smaller by a factor of than the pure mobile ad hoc networks.
منابع مشابه
Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملThe Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملBroadcast Routing in Wireless Ad-Hoc Networks: A Particle Swarm optimization Approach
While routing in multi-hop packet radio networks (static Ad-hoc wireless networks), it is crucial to minimize power consumption since nodes are powered by batteries of limited capacity and it is expensive to recharge the device. This paper studies the problem of broadcast routing in radio networks. Given a network with an identified source node, any broadcast routing is considered as a directed...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کامل