A New Node Density Based k-edge Connected Topology Control Method: A Desirable QoS Tolerance Approach
Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 4
Abstract
This research is an ongoing work for achieving consistency between topology control and QoS guarantee in MANET. Desirable topology and Quality of Service (QoS) control are two important challenges in wireless communication networks such as MANETs.In a Mobile Ad hoc Network, MANET, nodes move in the network area; therefore, the network topology is randomly and unpredictably changed. If the network topology is not controlled properly, the energy consumption is increased and also network topology probably becomes disconnected. To prevent from this situation, it is necessary to use desirable dynamic topology control algorithms such as k-edge connectivity methods. This papertries to improvethe three following parameters according to the k-edge connectivity concepts: (1) network performance, (2) reduce energy consumption, and (3) maintain the network connectivity. To achieve these goals, as a new method, we enhance k-edge connectivity methods using an improved definition of node density. The new method is called as: Node Density Based k-edge connected Topology Control (NDBkTC) algorithm. For the first time the node density definition is dynamically used. The new method, computes the node density based on a new equation which consists of the following factors: the relative velocity of nodes, distance between nodes, the number of nodes and the transmission range of nodes. The results show that our new method improves the network performance compared with the existing methods. Also we will show that the new method can holds QoS in a desirable tolerance range.
Authors and Affiliations
Mohsen Heydarian
Coverage Improving with Energy Efficient in Wireless Sensor Networks
Wireless sensor networks (WSNs) are formed by numerous sensors nodes that are able to sense different environmental phenomena and to transfer the collected data to the sink. The coverage of a network is one of the main d...
An Effective Risk Computation Metric for Android Malware Detection
Android has been targeted by malware developers since it has emerged as widest used operating system for smartphones and mobile devices. Android security mainly relies on user decisions regarding to installing applicatio...
An Intelligent Algorithm for the Process Section of Radar Surveillance Systems
In this paper, an intelligent algorithm for clustering, intra-pulse modulation detection and separation and identification of overlapping radar pulse train is presented. In most cases, based only on primary features of i...
Parameter Estimation in Hysteretic Systems Based on Adaptive Least-Squares
In this paper, various identification methods based on least-squares technique to estimate the unknown parameters of structural systems with hysteresis are investigated. The Bouc-Wen model is used to describe the behavio...
A Novel Resource Allocation Algorithm for Heterogeneous Cooperative Cognitive Radio Networks
In cognitive radio networks (CRN), resources available for use are usually very limited. This is generally because of the tight constraints by which the CRN operate. Of all the constraints, the most critical one is the l...