Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach
نویسندگان
چکیده
IEEE 802.11 and Mote devices are today two of the most interesting wireless technologies for ad hoc and sensor networks respectively, and many efforts are currently devoted to understand their potentialities. Unfortunately, few works adopt an experimental approach, though several papers highlight that popular simulation and analytical approximations may lead to very inaccurate results. In this paper we discuss outcomes from an extensive measurement study focused on these technologies. We analyze the dependence of the communication range on several parameters, such as node distance from ground, transmission data rate, environment humidity. Then, we study the extent of the physical carrier sensing zone around a sending node. Based on these elements, we provide a unified wireless link model for both technologies. Finally, by using this model we analyze well-known scenarios (such as the hidden node problem), and we modify the traditional formulations according to our experimental results.
منابع مشابه
Broadcast Routing in Wireless Ad-Hoc Networks: A Particle Swarm optimization Approach
While routing in multi-hop packet radio networks (static Ad-hoc wireless networks), it is crucial to minimize power consumption since nodes are powered by batteries of limited capacity and it is expensive to recharge the device. This paper studies the problem of broadcast routing in radio networks. Given a network with an identified source node, any broadcast routing is considered as a directed...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملReal-Time Communication in IEEE 802.11 Mobile Ad hoc Networks A Feasibility Study
Achieving predictable communication latency in an ad hoc IEEE 802.11 wireless local area network necessitates an approach that overcomes the impact of the underlying non-deterministic contention-based medium access control (MAC) protocol. In this paper, we assess the feasibility of using a Time Division Multiple Access (TDMA) layer above the IEEE 802.11 MAC protocol in order to achieve such pre...
متن کاملAssessment of DSACC and QPART Algorithms in Ad Hoc Networks
The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Pervasive and Mobile Computing
دوره 1 شماره
صفحات -
تاریخ انتشار 2005