Results 11  20
of
1,206
Efficient routing in intermittently connected mobile networks: The multiplecopy case
, 2008
"... Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc net ..."
Abstract

Cited by 299 (18 self)
 Add to MetaCart
Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, conventional routing schemes fail, because they try to establish complete endtoend paths, before any data is sent. To deal with such networks researchers have suggested to use floodingbased routing schemes. While floodingbased schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. Furthermore, proposed efforts to reduce the overhead of floodingbased schemes have often been plagued by large delays. With this in mind, we introduce a new family of routing schemes that “spray ” a few message copies into the network, and then route each copy independently towards the destination. We show that, if carefully designed, spray routing not only performs significantly fewer transmissions per message, but also has lower average delivery delays than existing schemes; furthermore, it is highly scalable and retains good performance under a large range of scenarios. Finally, we use our theoretical framework proposed in our 2004 paper to analyze the performance of spray routing. We also use this theory to show how to choose the number of copies to be sprayed and how to optimally distribute these copies to relays.
Topology Control in Wireless Ad Hoc and Sensor Networks
 ACM Computing Surveys
, 2005
"... Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of thi ..."
Abstract

Cited by 296 (4 self)
 Add to MetaCart
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of this technique is to control the topology of the graph representing the communication links between network nodes with the purpose of maintaining some global graph property (e.g., connectivity), while reducing energy consumption and/or interference that are strictly related to the nodes ’ transmitting range. In this article, we state several problems related to topology control in wireless ad hoc and sensor networks, and we survey stateoftheart solutions which have been proposed to tackle them. We also outline several directions for further research which we hope will motivate researchers to undertake additional studies in this field.
BUBBLE Rap: Socialbased forwarding in delay tolerant networks
 in Proc. ACM MobiHoc
, 2008
"... In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction is heteroge ..."
Abstract

Cited by 269 (31 self)
 Add to MetaCart
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction is heterogeneous both in terms of hubs (popular individuals) and groups or communities. We propose a social based forwarding algorithm, BUBBLE, which is shown empirically to improve the forwarding efficiency significantly compared to oblivious forwarding schemes and to PROPHET algorithm. We also show how this algorithm can be implemented in a distributed way, which demonstrates that it is applicable in the decentralised environment of PSNs.
Capacity of MultiChannel Wireless Networks with Random (c, f) Assignment
, 2007
"... With the availability of multiple unlicensed spectral bands, and potential costbased limitations on the capabilities of individual nodes, it is increasingly relevant to study the performance of multichannel wireless networks with channel switching constraints. To this effect, some constraint models ..."
Abstract

Cited by 269 (11 self)
 Add to MetaCart
With the availability of multiple unlicensed spectral bands, and potential costbased limitations on the capabilities of individual nodes, it is increasingly relevant to study the performance of multichannel wireless networks with channel switching constraints. To this effect, some constraint models have been recently proposed, and connectivity and capacity results have been formulated for networks of randomly deployed singleinterface nodes subject to these constraints. One of these constraint models is termed random (c, f) assignment, wherein each node is preassigned a random subset of f channels out of c (each having bandwidth W c), and may only switch on these. Previous results for this model established bounds on network capacity, and proved that when c = O(logn), the perprnd f flow capacity is O(W nlogn) and Ω(W cnlogn) (where prnd = 1 −(1 − f f f f 2 c)(1 − c−1)...(1 − c − f+1) ≥ 1 − e − c). In this paper we present a lower bound construction that matches the previous upper prnd bound. This establishes the capacity as Θ(W nlogn). The surprising implication of this result is that when f = Ω ( √ c), random (c, f) assignment yields capacity of the same order as attainable via unconstrained switching. The routing/scheduling procedure used by us to achieve capacity requires synchronized routeconstruction for all flows in the network, leading to the open question of whether it is possible to achieve capacity using asynchronous procedures.
Impact of human mobility on the design of opportunistic forwarding algorithms
 In Proc. IEEE Infocom
, 2006
"... Abstract — Studying transfer opportunities between wireless devices carried by humans, we observe that the distribution of the intercontact time, that is the time gap separating two contacts of the same pair of devices, exhibits a heavy tail such as one of a power law, over a large range of value. ..."
Abstract

Cited by 253 (15 self)
 Add to MetaCart
Abstract — Studying transfer opportunities between wireless devices carried by humans, we observe that the distribution of the intercontact time, that is the time gap separating two contacts of the same pair of devices, exhibits a heavy tail such as one of a power law, over a large range of value. This observation is confirmed on six distinct experimental data sets. It is at odds with the exponential decay implied by most mobility models. In this paper, we study how this new characteristic of human mobility impacts a class of previously proposed forwarding algorithms. We use a simplified model based on the renewal theory to study how the parameters of the distribution impact the delay performance of these algorithms. We make recommendation for the design of well founded opportunistic forwarding algorithms, in the context of human carried devices. I.
Characterizing the capacity region in multiradio multichannel wireless mesh networks
 in ACM MobiCom
, 2005
"... Next generation fixed wireless broadband networks are being increasingly deployed as mesh networks in order to provide and extend access to the internet. These networks are characterized by the use of multiple orthogonal channels and nodes with the ability to simultaneously communicate with many nei ..."
Abstract

Cited by 239 (0 self)
 Add to MetaCart
(Show Context)
Next generation fixed wireless broadband networks are being increasingly deployed as mesh networks in order to provide and extend access to the internet. These networks are characterized by the use of multiple orthogonal channels and nodes with the ability to simultaneously communicate with many neighbors using multiple radios (interfaces) over orthogonal channels. Networks based on the IEEE 802.11a/b/g and 802.16 standards are examples of these systems. However, due to the limited number of available orthogonal channels, interference is still a factor in such networks. In this paper, we propose a network model that captures the key practical aspects of such systems and characterize the constraints binding their behavior. We provide necessary conditions to verify the feasibility of rate vectors in these networks, and use them to derive upper bounds on the capacity in terms of achievable throughput, using a fast primaldual algorithm. We then develop two link channel assignment schemes, one static and the other dynamic, in order to derive lower bounds on the achievable throughput. We demonstrate through simulations that the dynamic link channel assignment scheme performs close to optimal on the average, while the static link channel assignment algorithm also performs very well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.
Impact of human mobility on opportunistic forwarding algorithms
 IEEE Trans. Mob. Comp
, 2007
"... Abstract — We study data transfer opportunities between wireless devices carried by humans. We observe that the distribution of the intercontact time (the time gap separating two contacts between the same pair of devices) may be well approximated by a power law over the range [10 minutes; 1 day]. T ..."
Abstract

Cited by 222 (21 self)
 Add to MetaCart
Abstract — We study data transfer opportunities between wireless devices carried by humans. We observe that the distribution of the intercontact time (the time gap separating two contacts between the same pair of devices) may be well approximated by a power law over the range [10 minutes; 1 day]. This observation is confirmed using eight distinct experimental data sets. It is at odds with the exponential decay implied by the most commonly used mobility models. In this paper, we study how this newly uncovered characteristic of human mobility impacts one class of forwarding algorithms previously proposed. We use a simplified model based on the renewal theory to study how the parameters of the distribution impact the performance in terms of the delivery delay of these algorithms. We make recommendations for the design of well founded opportunistic forwarding algorithms, in the context of human carried devices. I.
Unreliable Sensor Grids: Coverage, Connectivity and Diameter
 In Proceedings of IEEE INFOCOM
, 2003
"... We consider an unreliable wireless sensor gridnetwork with n nodes placed in a square of unit area. We are interested in the coverage of the region and the connectivity of the network. We first show that the necessary and sufficient conditions for the random grid network to cover the unit square reg ..."
Abstract

Cited by 218 (9 self)
 Add to MetaCart
We consider an unreliable wireless sensor gridnetwork with n nodes placed in a square of unit area. We are interested in the coverage of the region and the connectivity of the network. We first show that the necessary and sufficient conditions for the random grid network to cover the unit square region as well as ensure that the active nodes are connected are of the form p(n)r ,wherer(n) is the transmission radius of each node and p(n) is the probability that a node is "active" (not failed). This result indicates that, when n is large, even if each node is highly unreliable and the transmission power is small, we can still maintain connectivity with coverage.
On the Capacity of Hybrid Wireless Networks
, 2003
"... We study the throughput capacity of hybrid wireless networks. A hybrid network is formed by placing a sparse network of base stations in an ad hoc network. These base stations are assumed to be connected by a highbandwidth wired network and act as relays for wireless nodes. They are not data source ..."
Abstract

Cited by 217 (4 self)
 Add to MetaCart
We study the throughput capacity of hybrid wireless networks. A hybrid network is formed by placing a sparse network of base stations in an ad hoc network. These base stations are assumed to be connected by a highbandwidth wired network and act as relays for wireless nodes. They are not data sources nor data receivers. Hybrid networks present a tradeoff between traditional cellular networks and pure ad hoc networks in that data may be forwarded in a multihop fashion or through the infrastructure. It has been shown that the capacity of a random ad hoc network does not scale well with the number of nodes in the system [1]. In this work, we consider two different routing strategies and study the scaling behavior of the throughput capacity of a hybrid network. Analytical expressions of the throughput capacity are obtained. For a hybrid network of n nodes and m base stations, the results show that if m grows asymptotically slower than # n, the benefit of adding base stations on capacity is insignificant. However, if m grows faster than # n, the throughput capacity increases linearly with the number of base stations, providing an effective improvement over a pure ad hoc network. Therefore, in order to achieve nonnegligible capacity gain, the investment in the wired infrastructure should be high enough.
Connectivity in AdHoc and Hybrid Networks
 IN PROC. IEEE INFOCOM
, 2002
"... We consider a largescale wireless network, but with a low density of nodes per unit area. Interferences are then less critical, contrary to connectivity. This paper studies the latter property for both a purely adhoc network and a hybrid network, where fixed base stations can be reached in multipl ..."
Abstract

Cited by 217 (7 self)
 Add to MetaCart
(Show Context)
We consider a largescale wireless network, but with a low density of nodes per unit area. Interferences are then less critical, contrary to connectivity. This paper studies the latter property for both a purely adhoc network and a hybrid network, where fixed base stations can be reached in multiple hops. We assume here that power constraints are modeled by a maximal distance above which two nodes are not (directly) connected. We find that