On the User-centric Connection Availability of Mobile Wireless Networks

被引:0
|
作者
Xing, Fei [1 ]
Wang, Wenye [2 ]
机构
[1] Cisco Syst Inc, Wirless Networking Business Unit, San Jose, CA 95134 USA
[2] North Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
来源
2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2011年
关键词
AD-HOC NETWORKS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we study the connection availability of wireless networks from the perspective of end users with individual mobility, in contrast to existing studies mainly focusing on network-centric connectivity. Specifically, we evaluate the user connectivity by two metrics: neighbor connection time and neighbor isolation time. The former is the time for a node being connected with at least one neighbor; while the latter is the time for a node being isolated before it is connected to new neighbors. By using the theory of Markov renewal process, we obtain the asymptotic bounds on the expected neighbor connection and isolation times, which are dependent on the node density, transmission range, and average speed. We find that if the network is super-critical, implying the existence of a unique giant (connected) component, both asymptotic bounds scale with the number of nodes in the network; otherwise, expected connection and isolation times are constant.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A distributed broadcast algorithm for wireless mobile ad hoc networks
    Li Layuan
    Zheng Feng
    Li Chunlin
    Sun Qiang
    ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 494 - +
  • [32] Robust throughput and routing for mobile ad hoc wireless networks
    Rubin, Izhak
    Zhang, Runhe
    AD HOC NETWORKS, 2009, 7 (02) : 265 - 280
  • [33] Biologically Inspired Cooperative Routing for Wireless Mobile Sensor Networks
    Iyengar, S. S.
    Wu, Hsiao-Chun
    Balakrishnan, N.
    Chang, Shih Yu
    IEEE SYSTEMS JOURNAL, 2007, 1 (01): : 29 - 37
  • [34] Securing DSR with mobile agents in wireless ad hoc networks
    Abosamra, Ahmed
    Hashem, Mohamed
    Darwish, Gamal
    EGYPTIAN INFORMATICS JOURNAL, 2011, 12 (01) : 29 - 36
  • [35] Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks
    Mandala, Satria
    Jenni, Kommineni
    Ngadi, Md Asri
    Kamat, Maznah
    Coulibaly, Yahaya
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 57 - 67
  • [36] A fast network coding scheme for mobile wireless sensor networks
    Han, Chen
    Yang, Yuwang
    Han, Xu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (02):
  • [37] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123
  • [38] An Agent-Based Connection Management Protocol for Ad Hoc Wireless Networks
    Choudhury R.R.
    Paul K.
    Bandyopadhyay S.
    Journal of Network and Systems Management, 2002, 10 (04) : 483 - 504
  • [39] Service Location Protocols for mobile wireless ad hoc networks
    Toh, C. K.
    Guichal, Guillermo
    Kim, Dongkyun
    Li, Victor O. K.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (04) : 250 - 262
  • [40] Broadcast-Based Content Delivery in Information-Centric Hybrid Multihop Wireless Networks
    Kuang, Jian
    Yu, Shun-Zheng
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (04) : 889 - 892