2006 International Symposium on Ad Hoc and Ubiquitous Computing最新文献

筛选
英文 中文
Distributed Algorithm for Power Aware Connected Dominating Set for EfCcient Routing in Mobile Ad Hoc Networks 面向移动自组网高效路由的功率感知连接控制集分布式算法
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290650
S. Bhattacharjee, J. Tripathi, O. Mistry, J. Dattagupta
{"title":"Distributed Algorithm for Power Aware Connected Dominating Set for EfCcient Routing in Mobile Ad Hoc Networks","authors":"S. Bhattacharjee, J. Tripathi, O. Mistry, J. Dattagupta","doi":"10.1109/ISAHUC.2006.4290650","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290650","url":null,"abstract":"Efficient routing in ad hoc mobile environment with an economic use of battery power is an important problem and conventional routing protocols are unsuitable there due to static choice of routing paths without consideration of remaining battery power of the nodes. In this paper, we propose a simple and efficient distributed algorithm for calculating power aware connected dominating set for Ad hoc wireless networks. To enhance the lifetime of each node, which will in turn enhance the lifetime of the network, energy consumption here is balanced among different nodes of the network. Nodes are alternated in being selected to become a member of connected dominating set, which would enhance the lifetime of the network. In our approach each node select another node as its dominating neighbor depending on the status vector of its neighbor set. The status of a node is calculated based on its node degree and remaining battery power. The algorithm has 0(Δ2) time complexity and O(m) message complexity, where Δ is the maximum node degree and m is the number of edges in the topology graph. The dominating sets we obtain are in general comparable in size to that obtained in [1]. We ensured mobility support in our algorithm and our simulation result shows that, under the condition of mobility better lifespan is obtained using our approach as compared to other power aware approach.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122398875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power Aware Clustering Technique in Wireless Ad Hoc Networks 无线Ad Hoc网络中的功率感知聚类技术
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290651
S. K. Dhurandher, G. V. Singh
{"title":"Power Aware Clustering Technique in Wireless Ad Hoc Networks","authors":"S. K. Dhurandher, G. V. Singh","doi":"10.1109/ISAHUC.2006.4290651","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290651","url":null,"abstract":"The concept of clustering has been proved to be very effective in managing the resources at the MAC level in a wireless multi hop network. In this paper we present a power aware clustering algorithm for mobile ad-hoc networks. The proposed algorithm takes into account, the transmission power, transmission rate, mobility, battery power, and the degree of a node for cluster head selection. The Lowest-ID algorithm finds the local minima of IDs and the Weighted Clustering Algorithm (WCA) finds the global minima of weights for selecting cluster heads. In contrast, the proposed power aware clustering algorithm finds only the local minima of weights for the clustering process. Through simulations, we investigated the performance of our algorithm with that of Lowest-ID and WCA in terms of the number of clusterhead changes, the number of reaffiliations, the control overhead and the throughput. The results have demonstrated the superior performance of the proposed algorithm in terms of energy consumption in the network.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128954850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Analysis of IP Traceback Systems IP回溯系统分析
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290659
V. Murali, Bhaskarant M a, S. N. Natarajan, Sivanandam, Ac In
{"title":"Analysis of IP Traceback Systems","authors":"V. Murali, Bhaskarant M a, S. N. Natarajan, Sivanandam, Ac In","doi":"10.1109/ISAHUC.2006.4290659","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290659","url":null,"abstract":"The problem of identifying the sources of a denial of service (DoS) and distributed denial of services (DDoS) attack is hardest in the Internet security area, because attackers often use incorrect or spoofed source addresses of IP packets. IP traceback system is to identify the origin of IP packets when the source address of these packets is spoofed. In the traceback system, routers are playing vital role and also ISP (Internet Service Provider) involvement is required to trace the origin of the spoofed packets. Several approaches have been proposed to trace IP packets to their origin. Our aim is to evaluate and analyses the most promising traceback approaches with our proposed system. We have implemented using NS-2 simulator and also evaluated and summarized the results.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116945018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Routing Protocol for Delay-Sensitive Applications in Mobile Ad Hoc Networks 移动Ad Hoc网络中时延敏感应用的路由协议
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290641
Rakesh Kumar, M. Misra, A. Sarje
{"title":"A Routing Protocol for Delay-Sensitive Applications in Mobile Ad Hoc Networks","authors":"Rakesh Kumar, M. Misra, A. Sarje","doi":"10.1109/ISAHUC.2006.4290641","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290641","url":null,"abstract":"The Ad hoc On Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in ad hoc networks. To provide quality of service, extensions can be added to the messages used during route discovery. These extensions specifythe service requirements which must be met by nodes rebroadcasting a route request (RREQ) or returning a route reply (RREP) for a destination. In order to provide quality delivery to delay sensitive applications such as voice and video, it is extremely important that mobile ad hoc networks provide quality of service (QoS) support in terms of bandwidth and delay. In spite of using IEEE 802.11 as medium access control (MAC), most of the ad hoc routing protocols do not consider contention time which occurs in the medium reservation. Large contention times can be more critical than hop counts in determining the end-to-end delay. Most existing routing protocols for mobile ad hoc networks are designed to search for the shortest path with minimum hop counts. However, the shortest routes do not always provide the best performance, especially when there are congested nodes along these routes. In this paper we propose an on demand delay based quality of service (QoS) routing protocol (AODV-D) to ensure that delay does not exceed a maximum value for mobile ad hoc networks. This protocol will take into consideration MAC layer channel contention information and the number of packets in the interface queue in addition to minimum hops.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115149714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure Position Routing Using Ad hoc Network 使用自组织网络的安全位置路由
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290678
R. Ramesh, S. Kumar
{"title":"Secure Position Routing Using Ad hoc Network","authors":"R. Ramesh, S. Kumar","doi":"10.1109/ISAHUC.2006.4290678","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290678","url":null,"abstract":"Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. These routing protocols use geographical information to make forwarding decisions, resulting in a significant reduction in the number of routing messages. However, current position aided routing protocols were not designed for use in high-risk environments, as position information is broadcasted in the clear allowing anyone within range, including the enemy, to receive. We study methods of protecting position information in MANET routing protocols, and ways to use the position information to enhance performance and security of MANET routing protocols. We introduce \"secure position aided ad hoc routing\" (SPAAR), a routing protocol designed to use protected position information to improve security, efficiency, and performance in MANET routing.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Hybrid CAC Scheme for Integrated Services in CDMA Wireless Access Networks CDMA无线接入网中综合业务的混合CAC方案
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290654
N. Gopalan, C. Mala, R.K. Nayudu, D. Kumar
{"title":"A Hybrid CAC Scheme for Integrated Services in CDMA Wireless Access Networks","authors":"N. Gopalan, C. Mala, R.K. Nayudu, D. Kumar","doi":"10.1109/ISAHUC.2006.4290654","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290654","url":null,"abstract":"Current advances in the area of wireless access networks, and the increasing demand for real time services (e.g. video-on-demand, voice), requires, that the quality of service (QoS) guarantees in wireless networks are met, while ensuring a high level of network utilization. Call admission control (CAC) plays a significant role in providing the desired QoS in code division multiple access (CDMA) integrated wireless access network with heterogeneous services. Several CAC schemes for integrated services in CDMA wireless access network.s are available. Signal to interference ratio (SIR) based call admission and mobility based channel reservation (MBCR) call admission schemes are frequently used CAC schemes. SIR- based CAC always outperforms fixed CAC under hot spot loadings, as it can deal with varying traffic conditions very effectively. This is not the case in FDMA/TDMA cellular systems. But SIR based algorithms do not consider the mobility of users which have a profound effect on QoS. MBCR schemes are flexible to handle the dynamic traffic situations, as these schemes use the traffic information in the current cell and its neighboring cells and hence can adapt to the real-time network conditions. The drawback of this scheme is that it doesn't consider the effect of interference between cells which is a more realistic factor improving the performance of radio links in wireless access networks. To overcome these problems, this paper proposes a hybrid scheme which allocates channels in an efficient manner by taking into account the interference between cells and the mobility of users. Our simulation results show that this hybrid scheme performs better than the SIR and MBCR schemes.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient CPU Scheduling: A Genetic Algorithm based Approach 高效CPU调度:基于遗传算法的方法
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290681
Snehal Kamalapur, Neeta Deshpande
{"title":"Efficient CPU Scheduling: A Genetic Algorithm based Approach","authors":"Snehal Kamalapur, Neeta Deshpande","doi":"10.1109/ISAHUC.2006.4290681","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290681","url":null,"abstract":"Operating system's performance and throughput are highly affected by CPU scheduling. The scheduling is considered as an NP problem. An efficient scheduling improves system performance. This paper presents and evaluates a method for process scheduling. In this paper, we will discuss the use of genetic algorithms to provide efficient process scheduling. We will evaluate the performance and efficiency of the proposed algorithm in comparison with other deterministic algorithms by simulation. The results shows that proposed GA-based algorithm gives better performance measure. This paper attempts to present evaluation of proposed GA based scheduling against existing traditional algorithms.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133537703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Framework Design & Issues Involved in MANET Routing Protocol MANET路由协议框架设计及相关问题
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290679
B. Babu, P. kumar, D. Manjaiah
{"title":"Framework Design & Issues Involved in MANET Routing Protocol","authors":"B. Babu, P. kumar, D. Manjaiah","doi":"10.1109/ISAHUC.2006.4290679","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290679","url":null,"abstract":"A framework is designed for an ad hoc network, which is a matrix of cells of equal size and are connected in taurus structure. Each cell is of equal size and there are 100 of them and contains number of nodes. The cells are connected in taurus to make the simulation space infinite i.e. if the nodes wanders off the boundary of one side then it appears at the opposite side, this guarantee that all the nodes will participate in the entire simulation. For this a parallel simulator is designed considering routing protocols.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"18 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time-Variant Channel Estimation and Equalization for Wireless Mobile Applications 无线移动应用时变信道估计与均衡
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290667
S. Bansal, R. Bansal, Satnam Singh
{"title":"Time-Variant Channel Estimation and Equalization for Wireless Mobile Applications","authors":"S. Bansal, R. Bansal, Satnam Singh","doi":"10.1109/ISAHUC.2006.4290667","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290667","url":null,"abstract":"Channel estimation in smart antennas for wireless and mobile applications is needed for equalization so as to reduce the ill effects of inter symbol interference (ISI). In our earlier work, it was shown that a time dispersive channel, which can be modeled as an FIR channel can be estimated effectively by using active tap detection NLMS algorithm. The channel was, however, assumed to be stationary; but, for the mobile communication applications, owing to the mobility involved, this assumption is not justifiable. This work undertakes estimation of non stationary or time variant channel for equalization. The time invariance is modeled by using the random walk method that works by varying the tap weights of the underlying adaptive filter. Simulated results show that as standard LMS and NLMS algorithm does not even converge, active tap detection LMS/NLMS algorithm works well for time variant channels as well.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Mobility over Performance of the Ad hoc Networks 移动性对Ad hoc网络性能的影响
2006 International Symposium on Ad Hoc and Ubiquitous Computing Pub Date : 2006-12-01 DOI: 10.1109/ISAHUC.2006.4290661
V. Geetha, S. Aithal, K. Chandrasekaran
{"title":"Effect of Mobility over Performance of the Ad hoc Networks","authors":"V. Geetha, S. Aithal, K. Chandrasekaran","doi":"10.1109/ISAHUC.2006.4290661","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290661","url":null,"abstract":"An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. A number of routing protocols like Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), Destination-Sequenced Distance-Vector (DSDV) and Temporally Ordered Routing Algorithm (TORA) are normally used in ad hoc networks. In this paper an attempt has been made to compare the effect of mobility in case of on-demand reactive routing protocols for mobile ad hoc networks: AODV with traditional proactive DSDV protocol. The performance is analyzed using varying number of connections in the network, mobility pause and speed of the node. These simulations are carried out using the ns-2 network simulator.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信