簡易檢索 / 詳目顯示

研究生: 邵雅玲
Ya-ling Shao
論文名稱: 隨意無線網路提昇信號功率效率之技術
Reducing Interference to Attain Power Control in Ad Hoc Networks
指導教授: 黃進芳
Jhin-Fang Huang
口試委員: 蔡智明
Chih-Ming Tsai
魏炯權
Chung-Chuang Wei
徐敬文
Ching-Wen Hsue
黃正亮
Cheng-Liang Huang
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2005
畢業學年度: 93
語文別: 英文
論文頁數: 63
中文關鍵詞: 無線隨意網路隱藏式碰撞常數位元率變動位元率干擾
外文關鍵詞: Variable Bit Rate(VBR), Interference, Constant Bit Rate (CBR), Hidden terminal, Ad-Hoc Network
相關次數: 點閱:424下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在標準的IEEE 802.11通訊協定中,訂定每個行動主機在傳送封包時,採用理想性的最大功率傳送,但是很容易受到外在的干擾,而造成能源不必要的消耗。因此,在IEEE 802.11 MAC層通訊協定中,內有載波偵測和RTS/CTS的技術,來解決大部分的干擾問題,特別運用在無線隨意網路(Ad-Hoc)的系統架構。無線隨意網路架構,是指不需要連接有線網路,也不需要有基地台,短距離傳輸功率的網路。
    然而,也有許多相關的研究提出不同的MAC層通訊協定,來改善干擾問題,但是多半會造成更多能源不必要的損失。
    因此,在這篇論文中,提出了簡單且有效的方法,經過模擬證明,這個方法,不但能達到省電方式,更能保持傳輸品質不降低的情況下,能防止干擾的發生,並在原有的訊號雜訊比規格下SNR(signal to noise ratio),調整傳送端的距離,評估點與點(peer-to-peer)之間最佳的傳輸距離,並維持點與點之間封包傳輸所需的最小能量,而達到省電的功能。


    In the standard IEEE 802.11 MAC protocol, it defines each mobile host using ideal maximum transmission power to transmit, but it is very easy to suffer interference problem from outside environment and consume additional energy. Therefore, IEEE 802.11 MAC layer provides Carrier Sense Multiple Access/Collision Avoidance (physical carrier sensing) and RTS/CTS handshake (virtual carrier sensing) techniques, so that it can solve most of interference problems, specially utilized in the Ad Hoc networks. In Ad Hoc standards, it connects neither wired networks (like PSTN) nor base-stations, and it can achieve a great effect on transmitted power by short distance.
    However, many related researches also proposed different MAC protocols to solve or improve interference problems, but most of them will maybe cause more power consumptions at the same time.
    In this paper, we propose a simple and efficient power control method to verify the power saving by simulation. It not only achieves the power saving, but also keeps not reducing high signal received quality from interference. In original specification of SNR (signal to noise ratio), we can adjust the distance of transmission and find out the optimal range of “peer-to-peer”, so that we can keep the minimum transmitted power to achieve power saving.

    CONTENTS Chapter 1 Introduction………………………………………………………………………1 1.1 Motivation……………………………………………………………………2 1.2 Content Organization………………………………………………………4 Chapter 2 Related Works………………………………………………………………………5 2.1 Wireless Transmission Technologies……………………………………5 2.1.1 Bluetooth……………………………………………………………5 2.1.2 HomeRF…………………………………………………………………6 2.1.3 IrDA……………………………………………………………………8 2.1.4 IEEE 802.11…………………………………………………………9 2.2 Characteristics of Ad-Hoc wireless networks………………………10 2.3 Compare the cellular and Ad-Hoc wireless networks………………12 2.4 Types of Ad-Hoc Mobile Communication…………………………………16 2.4.1 Peer-to-peer communication……………………………………16 2.4.2 Remote-to-remote communication………………………………16 2.4.3 Hybrid communication……………………………………………17 2.5 Types of Mobile Host Movement…………………………………………17 2.5.1 Movements By SRC, DEST and Ins………………………………17 2.5.2 Movements By Subnet-Bridging MH………………………………18 2.5.3 Concurrent Mobile Host’s Movement…………………………19 2.6 An Ad-Hoc Application………………………………………………………20 2.6.1 A Mobile CSCW Application………………………………………20 2.7 Early Ad-Hoc Mobile Routing Schemes……………………………………21 2.7.1 Routing in PRNs……………………………………………………22 2.7.2 Packet Forwarding PRNs…………………………………………22 2.8 Current Ad-Hoc Mobile Routing Schemes…………………………………23 2.8.1 DSDV Routing………………………………………………………23 2.8.2 Dynamic Source Routing…………………………………………24 2.8.3 Ad Hoc on-Demand Distance Vector Routing…………………24 2.9 Quality of Server in Ad Hoc Wireless Networks………………………28 2.10 Hidden and Exposed Terminal Problems…………………………………31 Chapter 3 Scheme of power saving…………………………………………………………34 3.1 Influence of Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)…………………………………………………………34 3.2 Power Control MAC Protocol for Ad Hoc Networks………………………36 3.3 Ad Hoc Capacity………………………………………………………………40 3.3.1 MAC interference among a chain of node………………………40 3.3.2 Scenario foe investigation of collision due to large interference range…………………………………………………43 3.4 Two-Ray Ground Model…………………………………………………………46 3.5 Propagation Model……………………………………………………………49 3.6 Conservative CTS Reply (CCR)………………………………………………51 3.7 Power control to improve interference(PCII)…………………………51 Chapter 4 Simulation and Analysis..……………………………………………………53 4.1 Basic Simulation for AODV Routing Protocol……………………………53 4.1.1 AODV Protocol Advantages and Disadvantages…………………54 4.2 Simulation setting Parameter………………………………………………55 4.3 Compare Two Ray model and Free Space model……………………………57 4.4 Simulation Result and Analysis……………………………………………58 4.4.1 Corruption Ratio……………………………………………………58 4.4.2 Average Throughput…………………………………………………59 4.4.3 Power Consumption……………………………………………………59 Chapter 5 Conclusion…………………………………………………………………………63 5.1 Summary…………………………………………………………………………63

    Reference

    [1] Jeffrey P.Monks, Vaduvur Bharghavan, and Wen-mei W. Hwu, “A Power Controlled Multiple Access Protocol for Wireless Packet Networks, ” IEEE INFORCOM 2001.
    [2] Hidden Node. http://www.pviva.com/html/ciw/reaplay-ciw4.htm
    [3] IEEE 802.11 Working Group, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification,”1999.
    [4] Kaixin Xu, Mario Gerla, and Sang Bae, “How effective is the IEEE
    802.11 RTS/CTS Handshake in Ad Hoc Network?” IEEE GLOBECOM 2002.
    [5] A. Bhatnagar & T.G. Robertazzi. “Layer Net: A New Self-Organizing
    Network Protocol”. In Proceedings of MILCOM’90:IEEE Military
    Communications Conference, page 845-859, June1990.
    [6] P. Krishna, M. Chatterjee, N.H. Vaidya & D.K. Pradhan. “A Cluster-based Approach for Routing in Ad-Hoc Networks’’. In Proceedings of 2nd USENIX symposium on Mobile & Location-Independent Computing, pages 1-10, April 1995.
    [7] T. Izumoto, H. Shigeno, T. Yokoyama & Y. Matsushita. “ A Self-Organizing Wireless LAN System”. In Proceedings of IEEE 18th Conference on Local Computer Network, pages 467-473, September 1993.
    [8] David B. Johnson & David A. Maltz. “Dynamic Source Routing in Ad Hoc Wireless Networks”-In book on “Mobile Computing”,edited by Thomasz Imielinki & Hank Korth. Kluwer Academic Publishers 1996.
    [9] Mario Gerla & Jack Tzu-Chieh Tsai. “Multicluster Mobile, Multimedia Radio Network”. ACM Journal on Wireless Networks (WINET),(3):255-265, October 1995.
    [10] Keith Scott & Nicholas Bambos. “The Self-Organising Wireless Network Protocol For Communication Among Mobile Users”. In Proceedings of IEEE GlobeCom’95,pages 355-359,November 1995.
    [11] Keith L. Scott & Nicholas D. Bambos. “A Fully Distributed Algorithm for the Creation and Maintenance of Wireless Networks of Mobile Users”. Technical report, TR UCLA-ENG-95-112,Department of Electrical Engg , University of California at Los Angerles,1994.
    [12] M. Soctt Corson & Anthony Ephremides. “A Distributed Routing Algorithm for Mobile Radio Networks”. ACM Wireless Networks Journal.1(1):61-81,January 1995.
    [13] Charles Perkins & Pravin Bhagwat. “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers”. In Proceedings of ACM SIGCOMM’94, pages 234-244, Spetember 1994.
    [14] Dave Johnson. “Routing in Ad-Hoc Networks of Mobile Hosts”. In proceedings of IEEE Workshop in Mobile Computing & Applications, pages 158-163, December 1994.
    [15] S.Xu, and T.Saadawi, “Does the IEEE 802.11 MAC protocol Work Well in Multihop Wireless Ad Hoc Networks?”IEEE Communications Magazine, Volume 39 Issue 6, Jun.2001 pp/130-137.
    [16] J.Li,C.Blake,D.Couto,H.Lee, and R. Morris, “Capacity of Ad Hoc Wireless Networks,” In Proceedings of ACM MobiCom 2001,Rome,Italy,July 2001.
    [17] QualNet simulator.http://www.qualnet. com
    [18] Glomosim.http://pcl.cs.ucla.edu/projects/glomosim/
    [19] Kaixin Xu, Mario Gerla, “Effectiveness of RTS/CTS Handshake in
    IEEE 802.11 based Ad Hoc Networks”.
    [20] C. Siva Ram Murthy and B.S. Manoj , “Ad Hoc Wireless Networks” Architectures and Protocols.
    [21] C-K Toh “WIRELESS ATM and AD-HOC NETWORKS” Protocols and Architectures.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE