scholarly journals Minimalist Self-Organization in Wireless Networks

2011 ◽  
Vol 1 (1) ◽  
Author(s):  
Sébastien Roy ◽  
Philippe Leroux

Many fields of human endeavour, such as biology and the theory of complex systems, are now embracing the concept of self-organization based on local actions leading to a desirable global emergent behavior. While many examples, both natural and artificial, can be found of such self-organized systems, the relationship between the local rules and the global behavior remains elusive and no systematic procedure is known to engineer a specific global result. Given the increasing pervasiveness of wireless networks of all sorts, including ad hoc networks competing within narrow unlicensed bands and wireless sensor networks, self-organization could constitute the next defining paradigm in wireless communications. It can be shown that a set of heuristic principles can be leveraged to engineer a self-organized connection-oriented wireless network with minimal complexity. Such a system requires no centralization of information, yet achieves a nearly optimal global state with only a modest amount of local signaling. It will naturally and jointly balance the many parameters related to radio resource management, exhibiting great adaptability, fault tolerance and scalability.

Author(s):  
M.A. Sánchez-Acevedo ◽  
E. López-Mellado ◽  
F. Ramos-Corchado

Self-organization is a phenomenon in nature which has been studied in several areas, namely biology, thermodynamics, cybernetics, computing modeling, and economics. Systems exhibiting self-organization have well defined characteristics such as robustness, adaptability, and scalability, which make self-organization an attractive field of study for two kinds of applications: a) maintaining the communication among mobile devices in wireless networks, and b) coordination of swarms of mobile robots. In ad hoc networks, there is not necessarily an underlying infrastructure in which the nodes can maintain communicated with other nodes; so due to this feature, it is necessary to provide efficient self-organization algorithms for routing, managing, and reconfiguring the network. Furthermore, self-organization in nature provide clear examples about how complex behaviors can arise from only local interaction between entities, namely the ants colony, feather formation, and flock of birds. Based on the above mentioned examples, several algorithms have been proposed to accomplish robot formations using only local interactions. Due to resource constraints in mobile devices, selforganization requires simple algorithms for maintaining and adapting wireless networks. The use of resources for establishing robot formations can be reduced by improving simple rules to accomplish the formation. This article first presents a brief overview of several works developed in ad hoc networks; then, delves deeper into the key algorithms; and finally, challenges arising in this area are discussed.


2015 ◽  
Vol 11 (8) ◽  
pp. 384869 ◽  
Author(s):  
Cándido Caballero-Gil ◽  
Pino Caballero-Gil ◽  
Jezabel Molina-Gil

2013 ◽  
Vol 3 (1) ◽  
pp. 20 ◽  
Author(s):  
Dalia Elewely ◽  
Marwa Areed ◽  
Hesham Ali

Ad-hoc networks consist of a set of mobile nodes with a restricted power supply resources that can communicate with each other without any established infrastructure or centralized administration. The loss of some nodes may cause significant topological changes, undermine the network operation, and affect the lifetime of the network. This paper discusses the energy consumption problem and summaries the existing power saving techniques in ad-hoc wireless networks. The main objective of this paper is to introduce a new power aware multi-path node disjoint routing scheme based on the Dynamic Source Routing protocol (DSR), which can prolong MANETs lifetime, reduce routing delay and increase the reliability of the packets reaching its destination. Therefore, a comprehensive study of DSR protocol has been drawn using NS-2 simulator, to evaluate the performance of DSR as a routing strategy and investigate its efficiency in saving wireless networks resources, as a prelude to avoid its performance shortcomings in our proposed routing scheme. Keywords: Power aware protocol, node disjoint, network simulation 2, multipath routing, Dsr protocol, ad-hoc network.


2003 ◽  
Vol 2 (2) ◽  
pp. 102-113 ◽  
Author(s):  
Zhijun Cai ◽  
Mi Lu ◽  
Xiaodong Wang

Self-organized networks based on mobile devices (e.g., Mobile Ad Hoc Networks [MANET]) are becoming a practical platform for pervasive social networking. People, either familiar or strangers, communicate with each other via such a network for instant social activities. How to help mobile users to build up trust in pervasive social networking is becoming an important and interesting issue. Trust concerns not only security, but also privacy, as well as quality of social networking experiences. It relates to many properties that are essential for establishing a trust relationship in ephemeral and dynamically changed pervasive social environments. This chapter reviews the literature with regard to how to build up trust in pervasive social networking. The authors explore whether pervasive social networking is demanded, considering many existing popular Internet social networking services. Based on a need assessment survey, they propose a trust management framework that supports context-aware trust/reputation generation, trustworthy content recommendations, secure communications, unwanted traffic control, user privacy recommendations, and secure face-to-face pervasive social communications. Simulations, prototype implementation, and user experiments further prove the effectiveness of the proposed solutions.


Author(s):  
Tamaghna Acharya ◽  
Santi P. Maity

The acute scarcity of radio frequency spectrum has inspired to think of a new communication technology where the devices are expected to be able to sense and adapt to their spectral environment, thereby appearing as cognitive radios (CR) who can share opportunistically the bands assigned to primary users (PUs). At the same time, low cost, increased coverage, enhanced capacity, infrastructure-less configuration, and so forth, become the essence of future wireless networks. Although the two research fields came up independently, in due time it is observed that CR has a promising future and has excellent applications in wireless networks. To this aim, this chapter explores some scope of integration in CR and ad hoc networks (called here CRAHNETs) in some specific design perspective. First, a brief literature review on CR power allocation and energy aware routing in wireless ad hoc networks (WANETs) is done that highlights the importance for the scope of their integration. Then, power allocation in CRAHNETs with extended network lifetime is considered as an example problem. More specifically, the design problem is: given a set of paths (routes) between a pair of source (S) and destination (D) nodes in CRAHNETs, how to allocate optimal power to the source and relay nodes such that outage probability for data transmission is minimized and network lifetime is enhanced, while meeting the limits of total transmit power of CRs and interference threshold to PU simultaneously. A solution for the stated problem is proposed along with performance evaluation. A few related research problems are mentioned as future research directions.


Author(s):  
Piyush Kumar Shukla ◽  
Kirti Raj Bhatele

Wireless Networks are vulnerable in nature, mainly due to the behavior of node communicating through it. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operation. In this chapter, we analyze the security problems in MANET. On the prevention side, various key and trust management schemes have been developed to prevent external attacks from outsiders. Both prevention and detection method will work together to address the security concern in MANET.


Author(s):  
Arundhati Arjaria

Mobile ad hoc networks are infrastructure-less wireless networks; all nodes can quickly share information without using any fixed infrastructure like base station or access point. Wireless ad hoc networks are characterized by frequent topology changes, unreliable wireless channel, network congestion, and resource contention. Multimedia applications usually are bandwidth hungry with stringent delay, jitter, and loss requirements. Designing ad hoc networks which support multimedia applications, hence, is considered a hard task. The hidden and exposed terminal problems are the main which consequently reduces the network capacity. Hidden and exposed nodes reduce the performance of the wireless ad hoc networks. Access delay is the major parameter that is to be taken under consideration. Due to hidden and exposed terminal problems, the network suffers from a serious unfairness problem.


Author(s):  
N. Chand

Mobile wireless networks allow a more flexible communication structure than traditional networks. Wireless communication enables information transfer among a network of disconnected, and often mobile, users. Popular wireless networks such as mobile phone networks and wireless local area networks (LANs), are traditionally infrastructure based—that is, base stations (BSs), access points (APs), and servers are deployed before the network can be used. A mobile ad hoc network (MANET) consists of a group of mobile hosts that may communicate with each other without fixed wireless infrastructure. In contrast to conventional cellular systems, there is no master-slave relationship between nodes, such as base station to mobile users in ad-hoc networks. Communication between nodes can be supported by direct connection or multi-hop relays. The nodes have the responsibility of self-organizing so that the network is robust to the variations in network topology due to node mobility as well as the fluctuations of the signal quality in the wireless environment. All of these guarantee anywhere and anytime communication. Recently, mobile ad-hoc networks have been receiving increasing attention in both commercial and military applications.


Sign in / Sign up

Export Citation Format

Share Document