This document discusses multi-hop communication techniques for next generation wireless networks. It covers challenges with wireless networks like limited bandwidth and power. It then describes cognitive radio networks and how they can help address bandwidth issues. Multi-hop networking is presented as a solution for power limitations. Relay selection and power allocation algorithms are summarized as ways to improve multi-hop networks. Applications of these techniques to underwater wireless sensor networks and wireless body area networks are also outlined.
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā
Multi-hop Wireless Networks: Challenges and Solutions
1. Multi-hop Communication for the Next
Generation (xG) Wireless Network
M Shamim Kaiser
Visiting Research Fellow,i-Lab
āāAnglia Ruskin IT Research Institute
Anglia Ruskin University, Chelmsford
Problems and Perspectives
2. 2
Presentation Outline
ā¢ Why Wireless?
ā¢ Challenges of Wireless Network
ā¢ Cognitive Radio Network
ā¢ Multi-Hop Networking
ā¢ Relay Selection Algorithm
ā¢ Power Allocation Algorithm
ā¢ UWSN
ā¢ Anomaly in UWSN
ā¢ WBAN
3. 3
Why wireless?
Increased mobility & collaboration
Roam without losing your connection
Improved responsiveness
Connect to the information when
needed
Better access to information for all
Connect hard-to-reach areas
Easier network expansion
Add users quickly
Enhanced guest access
Give secure network access to
customers and business partners
Figure: Wireline connections
between communication devices
5. 5
Challenges of Wireless Network (cont.)
ā¢ Limited bandwidth (Can be solved by CRN).
ā¢ The transmit power is limited, cannot raise beyond a
certain level (in dB) (Multi-hop is the only option) .
ā¢ Capacity is limited (Improve SNR ane BW).
ā¢ Received power decreases with the increase of
frequency, and distance
8. 8
Multi-Hop Networking
Mobile ad hoc networks (MANETS)
ā¢ No AP, a group of mobile nodes communicates
ā¢ Communication between nodes is performed by direct
connection or through multiple hop relays.
ā¢ Mobile ad hoc networks have several practical
applications including battlefield communication,
emergency first response, and public safety systems.
9. 9
Multi-Hop Networking (cont.)
Multi-hop cellular networks
ā¢ Cellular systems conventionally employ single hops between
mobile units and the base station.
ā¢ As cellular systems evolve from voice centric to data centric
communication, edge-of-cell throughput is becoming a
significant concern.
ā¢ This problem is accentuated in systems with higher carrier
frequencies (more path loss) and larger bandwidth (larger
noise power).
ā¢ A promising solution to the problem of improving coverage and
throughput is the use of relays.
ā¢ Several different relay technologies are under intensive
investigation including fixed relays (connected to power
source) and mobile relays (energy constrain)
14. 14
Relay Selection Algorithm (cont.)
Relay Selection Criterion
*M S Kaiser et al, Neuro-Fuzzy based Joint Relay-Selection and Resource-Allocation for Cooperative Networks ECTI
Transactions on Electrical Engineering, Electronics, and Communications, 9(2), 187-196, 2008
*M S Kaiser et al, Neuro-Fuzzy Relay selection for Cognitive Cooperative Network, Journal of Communications,
Inderscience (Article in the press)
27. 27
Power Allocation Algorithm (cont.)
*M S Kaiser and Kasi M Ahmed, Radio Resource Allocation for Heterogeneous Services in Relay Enhanced OFDMA
System, J of Communications, 5(6), 2010,
31. 31
M S Kaiser, S A Mamun and K M Ahmed, Interference Temperature Constraint-based Radio Resource Allocation for the
Network Coded Cognitive Cooperative Network (NCCCN), Journal of Computer Application, Volume 67 - No. 7, April 2013
44. 44
Under water wireless Sensor Network
Nusrat Z. Zenia et al, An Energy Efficient and Reliable Cluster-based Adaptive MAC protocol for UWSN, IEEE ICEEICT 2015
Nusrat Z. Zenia et al, Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network,
Journal of Network and Computer Applications 71 (2016) 72ā85
45. 45
WSN Attack detection
ā¢ Node behaviour (Good/Faulty/Attacker)
based on DempsterāShafer theory
ā¢ It is a generalization of the Bayesian
theory of subjective probability.
ā¢ Belief functions base degrees of
belief (or confidence, or trust) for
one question on the probabilities for
a related question.
ā¢ It combines multiple evidences to
identify the malicious attacks.
ā¢ Finding: It can detect faulty nodes
and attack nodes. But the accuracy
is more than 70%
M. R. Ahmed, M. Aseeri, M. S. Kaiser, N. Z. Zenia and Z. I. Chowdhury, "A novel algorithm for malicious attack detection in
UWSN," ICEEICT), 2015, Dhaka, 2015, pp. 1-6. doi: 10.1109/ICEEICT.2015.7307516
A novel algorithm for malicious attack detection in UWSN
50. 50
WBAN (cont.)
Phase 1: NC will allocate variable-length
transmission time slot for each of the layers
Phase 2: NC will divide total allocated time
for a particular layer among its clusters
based on data the cluster needs to transmit.
Phase 3: Based on the assigned time slots
of each node transmit