Minimum Frequencies for the Virtual Maximum MAC Capacity in a Multichannel Ad-Hoc Network

Since the very first work of asymptotic capacity problem in a wireless ad-hoc network, rich variations such as adding mobility, the usage of directional antenna, and introducing infrastructure have been studied. The intention behind adding these technologies is to reduce inter-node interference and the relay burden of nodes because these are the main causes of vanishing throughput in wireless ad- hoc networks. Another way to increase network capacity is to use the utilization of multichannels. However, the most recent result on the capacity of a multichannel ad- hoc network showed that the usage of multichannels and multiple NICs can not break through the same capacity limit as with single channel. More specifically, assuming finite NICs at a node, the per-node throughput of at most Thetaradic(logn/n) can be maintained by utilizing up to Theta(logn/n) channels beyond which capacity loss occurs. In order to give a new perspective on this phenomenon, we define the Minimum Frequencies for the Virtual Maximum MAC Capacity (MFVMC) problem in this paper. The objective of the problem is to find the minimum frequencies to guarantee collision-free transmissions at a given time slot for any maximum matching of a given graph. Focusing our interest to the set of unit disk graphs with the maximum node degree of d, we prove that Theta(d) is the tight bound for the MFVMC problem. We discuss the implication of this result on the asymptotic network capacity in a multichannel ad-hoc network.

[1]  J. A. Bondy,et al.  Graph Theory with Applications , 1978 .

[2]  Van Jacobson,et al.  Random early detection gateways for congestion avoidance , 1993, TNET.

[3]  J. A. Bondy,et al.  Graph Theory with Applications , 1978 .

[4]  Steven J. Templeton,et al.  Detecting spoofed packets , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[5]  C.C. Zou,et al.  Adaptive Defense Against Various Network Attacks , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Yong Pei,et al.  On the capacity improvement of ad hoc wireless networks using directional antennas , 2003, MobiHoc '03.

[7]  Ibrahim Matta,et al.  BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[8]  Mark Handley,et al.  Steps towards a DoS-resistant internet architecture , 2004, FDNA '04.

[9]  V. Fineberg,et al.  A practical architecture for implementing end-to-end QoS in an IP network , 2002, IEEE Commun. Mag..

[10]  Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion) , 2000, Security Protocols Workshop.

[11]  David Tse,et al.  Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.

[12]  Danilo Bruschi,et al.  Voice over IPsec: analysis and solutions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[13]  Jesús Arturo Pérez Díaz,et al.  Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[14]  Panganamala Ramana Kumar,et al.  The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.

[15]  Tzi-cker Chiueh,et al.  Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[16]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[17]  Klaus Wehrle,et al.  An Open Architecture for Evaluating Arbitrary Quality of Service Mechanisms in Software Routers , 2001, ICN.

[18]  Leandros Tassiulas,et al.  Throughput capacity of random ad hoc networks with infrastructure support , 2003, MobiCom '03.

[19]  Ratul Mahajan,et al.  Controlling high bandwidth aggregates in the network , 2002, CCRV.

[20]  Nitin H. Vaidya,et al.  Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver , 2004, MobiHoc '04.

[21]  Nitin H. Vaidya,et al.  Capacity of multi-channel wireless networks: impact of number of channels and interfaces , 2005, MobiCom '05.

[22]  Holly Xiao,et al.  Quality effects of wireless VoIP using security solutions , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[23]  Donald F. Towsley,et al.  On the capacity of hybrid wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[24]  Mohammad Zulkernine,et al.  Detecting Flooding-Based DDoS Attacks , 2007, 2007 IEEE International Conference on Communications.

[25]  Vincenzo Piuri,et al.  A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems , 2005, CF '05.

[26]  P. Bahl,et al.  SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks , 2004, MobiCom '04.

[27]  Jelena Mirkovic,et al.  Alliance formation for DDoS defense , 2003, NSPW '03.

[28]  Madhav V. Marathe,et al.  The distance-2 matching problem and its relationship to the MAC-Layer capacity of ad hoc wireless networks , 2004, IEEE Journal on Selected Areas in Communications.

[29]  Robert Tappan Morris,et al.  Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.

[30]  Wei Chen,et al.  An active detecting method against SYN flooding attack , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[31]  Kartik Gopalan,et al.  Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic , 2005, SRUTI.