Analysis of Interference in Ad-Hoc Networks
نویسندگان
چکیده
Despite the focused attention to Mobile Ad-Hoc Networks (MANETs) in the past years, models of interference on the abstraction level of graphs are poorly studied. It is often argued that assuring low degree in topologies is sufficient to minimize interference. In this work, several models of interference are defined. A classification of models is developed and relations among different models are investigated. One of the main differences between models is whether they focus on outgoing (Iout) or incoming (Iin) interference. For Iout a greedy algorithm (GLIT) is presented that constructs an interference optimal spanning tree. GLIT can be adapted to construct an interference optimal t-spanner (GLIS). Based on these models, the maximum degree of a network turns out to be merely a lower bound for interference and thus the need for topologies that minimize actual interference instead of node degree becomes obvious. Despite the fact that reducing interference is the main reason for doing topology control at all, widely used topologies as the Minimum Spanning Tree, Relative Neighborhood Graph, Gabriel Graph, Delaunay Triangulation or Yao graph are shown to be prone to bad interference properties, while the introduced algorithms GLIT and GLIS are interference optimal for Iout and provide good heuristics for other measures. Moreover, the MINIMUM INTERFERENCE BROADCAST (MIB) problem and its connected variant (CMIB) are defined. Solutions to CMIB can be used as interference optimal virtual backbones in ad-hoc networks. Although MIB and CMIB are shown to be NP-complete, a constant approximation of both is given. Changing the interference model from Iin to Iout makes MIB and CMIB optimally solvable in polynomial time, which is a very intriguing result concerning the complexity of interference measures.
منابع مشابه
The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملCapacity Enhancement of Ad Hoc Networks using a New Beamforming Scheme Based on ESPAR
This paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (ESPAR). The proposed method is capable of providing better capacity compared to the conventional ESPAR. The termination of each antenna element in this structure comprises a PIN diode in addition to a varactor. Using PIN diode besides the varactor provides more degrees of freed...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملAssessment of DSACC and QPART Algorithms in Ad Hoc Networks
The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...
متن کاملSurvey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کامل