scholarly journals Ad hoc networks capacity scaling problem

2021 ◽  
Vol 1 (1) ◽  
pp. 21-28
Author(s):  
Adisa Hasković Džubur ◽  
Alem Čolaković ◽  
Belma Memić ◽  
Elma Avdagić-Golub

A large number of researchers found their interest in addressing the issue of capacity scaling for wireless ad hoc networks. This paper aims to provide a comprehensive overview of the development of capacity scaling laws in wireless networks, highlighting the problem of scaling as one of the basic challenges in their research. The review began with the definition of the notion of bandwidth of random networks, which were taken as a reference model of consideration when determining more advanced strategies for improving throughput capacity. Based on these strategies, other factors that have an impact on capacity scaling laws have been identified and elaborated. Finally, the capacity of hybrid wireless networks, ie networks in which at least two types of nodes functionally exist (ad hoc nodes/infrastructure nodes / auxiliary nodes), was partially investigated.

Author(s):  
Tamaghna Acharya ◽  
Santi P. Maity

The acute scarcity of radio frequency spectrum has inspired to think of a new communication technology where the devices are expected to be able to sense and adapt to their spectral environment, thereby appearing as cognitive radios (CR) who can share opportunistically the bands assigned to primary users (PUs). At the same time, low cost, increased coverage, enhanced capacity, infrastructure-less configuration, and so forth, become the essence of future wireless networks. Although the two research fields came up independently, in due time it is observed that CR has a promising future and has excellent applications in wireless networks. To this aim, this chapter explores some scope of integration in CR and ad hoc networks (called here CRAHNETs) in some specific design perspective. First, a brief literature review on CR power allocation and energy aware routing in wireless ad hoc networks (WANETs) is done that highlights the importance for the scope of their integration. Then, power allocation in CRAHNETs with extended network lifetime is considered as an example problem. More specifically, the design problem is: given a set of paths (routes) between a pair of source (S) and destination (D) nodes in CRAHNETs, how to allocate optimal power to the source and relay nodes such that outage probability for data transmission is minimized and network lifetime is enhanced, while meeting the limits of total transmit power of CRs and interference threshold to PU simultaneously. A solution for the stated problem is proposed along with performance evaluation. A few related research problems are mentioned as future research directions.


Author(s):  
Arundhati Arjaria

Mobile ad hoc networks are infrastructure-less wireless networks; all nodes can quickly share information without using any fixed infrastructure like base station or access point. Wireless ad hoc networks are characterized by frequent topology changes, unreliable wireless channel, network congestion, and resource contention. Multimedia applications usually are bandwidth hungry with stringent delay, jitter, and loss requirements. Designing ad hoc networks which support multimedia applications, hence, is considered a hard task. The hidden and exposed terminal problems are the main which consequently reduces the network capacity. Hidden and exposed nodes reduce the performance of the wireless ad hoc networks. Access delay is the major parameter that is to be taken under consideration. Due to hidden and exposed terminal problems, the network suffers from a serious unfairness problem.


Author(s):  
Surinder Khurana ◽  
Manmeet Singh

The advancements made in the field of wireless networks have led the technology to the use of wireless ad-hoc networks in mainstream routines. The performance of these networks is heavily depends on routing protocols. Various routing protocols have been proposed. However, these protocols are prone to various type of attacks. This chapter discusses the vampire attack that is a risk to the energy resources of the wireless ad-hoc networks which drain the energy of the network by sending protocol compliant messages. In this chapter, we identify various categories of vampire attacks. This chapter discusses a secure sensor routing protocol designed to be invulnerable to various attacks but its topology discovery phase is vulnerable to the vampire attacks. This chapter also presents a modification to the protocol's topology discovery phase to detect the nodes performing vampire attacks and prevent the network from these attacks.


An ad hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network device in link range. In particular, ad hoc network often refers to a mode of operation of IEEE 802.11 wireless networks. A wireless ad hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes cannot be relied on and may improve the scalability of networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such networks have been identified. This chapter explores this.


2014 ◽  
Vol 79 (1) ◽  
pp. 629-646 ◽  
Author(s):  
Salah Abdulhadi ◽  
Muhammad Jaseemuddin ◽  
Alagan Anpalagan

Sign in / Sign up

Export Citation Format

Share Document