Estimation of Ad Hoc Network Topology Preserving Neighbor Relations among Nodes

Author(s):  
Kei Itoh ◽  
Hiroaki Higaki
2014 ◽  
Vol 644-650 ◽  
pp. 2834-2837
Author(s):  
Qiong Yu ◽  
Ping Zong

According to the dynamic characteristics of ad hoc network topology, this paper optimizes the clustering algorithm using node energy consumption and the relative connectivity as the factors of weights. Simulation results show the optimized weighted clustering algorithm (OWCA) get better performance than other algorithm, the cluster heads are distributed evenly, the cluster structure becomes more reasonable and stable.


2013 ◽  
Vol 718-720 ◽  
pp. 2208-2213
Author(s):  
Yong Li ◽  
Guang Ming Xiong ◽  
Peng Liu ◽  
Yin Jian Sun ◽  
Jian Wei Gong

Multi-robot system is one of the important study topics of robotics. Many near field wireless communication technologies are used in different systems nowadays. In this paper, the Zigbee module is chosen as the wireless communication solution for Multi-P3-AT-Robot Platform since it can build the Ad Hoc Network. Tests of the combination of different network topology structure and data sending mode were made using two platforms and three platforms. According to the test results and the application requirement, the star network topology and the broadcasting mode is configured in the Zigbee module which is used to build the Ad hoc network for multi-P3-AT-robot platform. Through the ability of self-organizing network, each platform can realize data interaction with other robots, and task planning & coordination between platforms. Moreover, the communication between each two platforms will not be affected although the connection may change due to the movement of the platform.


2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Shigeru Kashihara ◽  
Takuma Hayashi ◽  
Yuzo Taenaka ◽  
Takeshi Okuda ◽  
Suguru Yamaguchi

This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.


2006 ◽  
Vol 03 (03) ◽  
pp. 233-245
Author(s):  
A. SHAJIN NARGUNAM ◽  
M. P. SEBASTIAN

Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure-less networks is how to manage the cryptographic keys that are needed. In MANET any node may compromise the packet routing functionality by disrupting the route discovery process. These unique characteristics of mobile ad hoc networks such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology cause a number of nontrivial challenges to security design. These challenges make a cause for building multi-fence security solution that achieves both extensive protection and desirable network performance. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non-overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1669
Author(s):  
Jaeho Choi ◽  
Seunghyeok Oh ◽  
Joongheon Kim

This paper proposes an energy-efficient cluster head selection method in the wireless ad hoc network by using a hybrid quantum-classical approach. The wireless ad hoc network is divided into several clusters via cluster head selection, and the performance of the network topology depends on the distribution of these clusters. For an energy-efficient network topology, none of the selected cluster heads should be neighbors. In addition, all the selected cluster heads should have high energy-consumption efficiency. Accordingly, an energy-efficient cluster head selection policy can be defined as a maximum weight independent set (MWIS) formulation. The cluster head selection policy formulated with MWIS is solved by using the quantum approximate optimization algorithm (QAOA), which is a hybrid quantum-classical algorithm. The accuracy of the proposed energy-efficient cluster head selection via QAOA is verified via simulations.


Sign in / Sign up

Export Citation Format

Share Document