Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-dfsvx Total loading time: 0 Render date: 2024-04-27T01:16:23.460Z Has data issue: false hasContentIssue false

11 - Mobile Ad-Hoc Networks and Delay-Tolerant Networks With Wireless Energy Harvesting

from Part III - Applications of Wireless Energy Harvesting and Transfer

Published online by Cambridge University Press:  01 December 2016

Dusit Niyato
Affiliation:
Nanyang Technological University, Singapore
Dusit Niyato
Affiliation:
Nanyang Technological University, Singapore
Ekram Hossain
Affiliation:
University of Manitoba, Canada
Dong In Kim
Affiliation:
Sungkyunkwan University, Korea
Vijay Bhargava
Affiliation:
University of British Columbia, Vancouver
Lotfollah Shafai
Affiliation:
University of Manitoba, Canada
Get access

Summary

Introduction

Mobile ad-hoc Networks (MANETs) are composed of mobile nodes communicating over multiple hops from a source to a destination. They do not have an infrastructure such as a base station or an access point to facilitate data transfer. Mobile nodes acting as relays receive data from the source or other relays and forward such data to the next hop until the destination has been reached. Delay-tolerant Networks (DTNs) are a special kind of MANET that will allow mobile nodes to receive, store, and forward data when they move and meet each other. Unlike in MANETs, in DTNs, there is no need for an end-to-end path from the source to the destination when the data are transferred. Thus, DTNs are suitable for non-real-time traffic, namely delay-tolerant traffic. Typically, in MANETs and DTNs, the energy supply to the mobile nodes in the networks is limited and intermittent. Additionally, mobility makes data transfer less reliable than in infrastructure-based wireless networks such as cellular systems. Therefore, when one adopts wireless energy harvesting and transfer, some related issues, e.g., routing and energy replenishment, have to be revisited.

This chapter deals with wireless-powered MANETs and DTNs. Firstly, overviews of MANETs and DTNs are presented. Some issues related to energy in conventional MANETs and DTNs are discussed. Then, the chapter presents in detail energy management approaches for mobile nodes in wireless-powered MANETs and DTNs.

  1. • The first approach deals with content delivery services in a wireless-powered DTN. In the network, a mobile node acting as a mobile router moves randomly to collect content from a content source and deliver it to a gateway. The mobile node receives energy from the gateway, and thus must optimize energy usage for content delivery. A constrained Markov decision process (CMDP) is formulated and solved to obtain an optimal content delivery policy. Additionally, multiple mobile nodes can help each other to deliver content from different content sources. A coalition formation game is applied to determine an optimal coalition among mobile nodes.

  2. • The second approach considers delay-limited communication in the wireless-powered MANET. The mobile node generates and has to transmit delay-sensitive data before a deadline. If the deadline is violated, the data become useless and will be discarded and lost.

Type
Chapter
Information
Wireless-Powered Communication Networks
Architectures, Protocols, and Applications
, pp. 383 - 429
Publisher: Cambridge University Press
Print publication year: 2016

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] C. E., Perkins, Ad Hoc Networking. New York, NY : Addison-Wesley Professional, 2001.
[2] J., Li, D., Cordes, and J., Zhang, “Power-aware routing protocols in ad hoc wireless networks,” IEEE Wireless Communications, vol. 12, no. 6, pp. 69–81, December 2005.Google Scholar
[3] I., Stojmenovic and X., Lin, “Power-aware localized routing in wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 12, no. 11, pp. 1122–1133, November 2001.Google Scholar
[4] Y., Xue and B., Li, “A location-aided power-aware routing protocol in mobile ad hoc networks,” in IEEE Global Telecommunications Conference (GLOBECOM), vol. 5, 2001, pp. 2837–2841.
[5] R., Ramanathan and R., Rosales-Hain, “Topology control of multihop wireless networks using transmit power adjustment,” in Joint Conference of IEEE Computer and Communications Societies (INFOCOM), vol. 2, 2000, pp. 404–413.Google Scholar
[6] N., Kayastha, D., Niyato, P., Wang, and E., Hossain, “Applications, architectures, and protocol design issues for mobile social networks: A survey,” Proceedings of the IEEE, vol. 99, no. 12, pp. 2130–2158, December 2011.Google Scholar
[7] S., Eshghi, M. H. R., Khouzani, S., Sarkar, N. B., Shroff, and S. S., Venkatesh, “Optimal energy-ware epidemic routing in DTNs,” IEEE Transactions on Automatic Control, vol. 60, no. 6, pp. 1554–1569, June 2015.Google Scholar
[8] C., Chilipirea, A., Petre, and C., Dobre, “Energy-aware social-based routing in opportunistic networks,” in International Conference on Advanced Information Networking and Applications Workshops (WAINA), March 2013, pp. 791–796.Google Scholar
[9] P., Hui, J., Crowcroft, and E., Yoneki, “BUBBLE Rap: Social-based forwarding in delaytolerant networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 11, pp. 1576–1589, November 2011.Google Scholar
[10] B.-J., Choi and X., Shen, “Adaptive asynchronous clock based power saving protocols for delay tolerant networks,” in IEEE Global Telecommunications Conference (GLOBECOM), November–December 2009.
[11] K., Huang, “Spatial throughput of mobile ad hoc networks powered by energy harvesting,” IEEE Transactions on Information Theory, vol. 59, no. 11, pp. 7597–7612, November 2013.Google Scholar
[12] D., Niyato, P., Wang, H. P., Tan, W., Saad, and D. I., Kim, “Cooperation in delay tolerant networks with wireless energy transfer: Performance analysis and optimization,” IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp. 3740–3754, August 2015.Google Scholar
[13] J., Li, Y.-G., Qu, Q.-Y., Li, and B.-H., Zhao, “A queue management MAC protocol for delaytolerant mobile sensor networks,” in Proc. International Conference on Advanced Computer Control (ICACC), vol. 1, March 2010, pp. 426–430.Google Scholar
[14] P., Das, K., Dubey, and T., De, “Priority aided scheduling of pigeons in homing-pigeon-based delay tolerant networks,” in Proc. IEEE International Advance Computing Conference (IACC), February 2013, pp. 212–217.Google Scholar
[15] M.-C., Chuah, and W.-B., Ma, “Integrated buffer and route management in a DTN with message ferry,” in Proc. IEEE Military Communications Conference (MILCOM), October 2006.
[16] A., Lindgren and K. S., Phanse, “Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networks,” in Proc. International Conference on Communication System Software and Middleware (Comsware), 2006.
[17] Y., Li, M., Qian, D., Jin, L., Su, and L., Zeng, “Adaptive optimal buffer management policies for realistic DTN,” in Proc. IEEE Global Telecommunications Conference (GLOBECOM), November–December 2009.
[18] L., Yin, H.-M., Lu, Y.-D., Cao, and J.-M., Gao, “Buffer scheduling policy in DTN routing protocols,” in Proc. International Conference on Future Computer and Communication (ICFCC), May 2010, pp. 808–813.Google Scholar
[19] A., Krifa, C., Barakat, and T., Spyropoulos, “Message drop and scheduling in DTNs: Theory and practice,” IEEE Transactions on Mobile Computing, vol. 11, no. 9, pp. 1470–1483, September 2012.Google Scholar
[20] S., Dimitriou and V., Tsaoussidis, “Effective buffer and storage management in DTN nodes,” in Proc. International Conference on Ultra Modern Telecommunications & Workshops (ICUMT), October 2009.
[21] V. N. G. J., Soares, F., Farahmand, and J. J. P. C., Rodrigues, “Evaluating the impact of storage capacity constraints on vehicular delay-tolerant networks,” in Proc. International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ), July 2009, pp. 75–80.Google Scholar
[22] J., Zhou, J., Li, Y., Qian, S., Roy, and K., Mitchell, “Quasi-optimal dual-phase scheduling for pigeon networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 9, pp. 4157–4169, November 2012.Google Scholar
[23] D., Niyato and P., Wang, “Optimization of the mobile router and traffic sources in vehicular delay tolerant network,” IEEE Transactions on Vehicular Technology, vol. 58, no. 9, pp. 5095–5104, November 2009.Google Scholar
[24] D., Niyato, P., Wang, W., Saad, and A., Hjørungnes, “Coalition formation games for improving data delivery in delay tolerant networks,” in Proc. Global Telecommunications Conference (GLOBECOM), December 2010.
[25] R., Urgaonkar and M. J., Neely, “Network capacity region and minimum energy function for a delay-tolerant mobile ad hoc network,” IEEE/ACM Transactions on Networking, vol. 19, no. 4, pp. 1137–1150, August 2011.Google Scholar
[26] S., Yang, C. K., Yeo, and F. B. S., Lee, “Cooperative duty cycling for energy-efficient contact discovery in pocket switched networks,” IEEE Transactions on Vehicular Technology, vol. 62, no. 4, pp. 1815–1826, May 2013.Google Scholar
[27] X., Ren and W., Liang, “Delay-tolerant data gathering in energy harvesting sensor networks with a mobile sink,” in Proc. IEEE Global Communications Conference (GLOBECOM), December 2012, pp. 93–99.Google Scholar
[28] Y., Li, Y., Jiang, D., Jin, L., Su, and L., Zeng, “Optimal opportunistic forwarding policies for energy-constrained delay tolerant networks,” in Proc. IEEE International Conference on Communications (ICC), May 2010.
[29] M. L., Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. New York, NY : Wiley-Interscience, 1994.
[30] Z., Han, D., Niyato, W., Saad, T., Basar, and A., Hjørungnes, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge : Cambridge University Press, 2011.
[31] D., Niyato and P., Wang, “Delay-limited communication of mobile node with wireless energy harvesting: Performance analysis and optimization,” IEEE Transactions on Vehicular Technology, vol. 63, no. 4, pp. 1870–1885, May 2014.Google Scholar
[32] F., Iannello, O., Simeone, and U., Spagnolini, “Energy management policies for passive RFID sensors with RF-energy harvesting,” in Proc. IEEE International Conference on Communications (ICC), May 2010.
[33] S., Park, J., Heo, B., Kim et al., “Optimal mode selection for cognitive radio sensor networks with RF energy harvesting,” in Proc. IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), September 2012, pp. 2155–2159.Google Scholar
[34] I., Krikidis, S., Timotheou, and S., Sasaki, “RF energy transfer for cooperative networks: Data relaying or energy harvesting?,” IEEE Communications Letters, vol. 16, no. 11, pp. 1772–1775, November 2012.Google Scholar
[35] V., Shenoy and C. R., Murthy, “Throughput maximization of delay-constrained traffic in wireless energy harvesting sensors,” in Proc. IEEE International Conference on Communications (ICC), May 2010.
[36] P., Blasco, D., Gunduz, and M., Dohler, “A learning theoretic approach to energy harvesting communication system optimization,” IEEE Transactions onWireless Communications, vol. 12, no. 4, pp. 1872–1882, April 2013.Google Scholar
[37] Z., Hasan, H., Boostanimehr, and V. K., Bhargava, “Green cellular networks: A survey, some research issues and challenges,” IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 524–540, fourth quarter 2011.Google Scholar
[38] T. ur Rehman, Ahsin and S. Ben, Slimane, “Energy efficient resource allocation and deployment strategies for wireless networks,” in Proc. International Conference on New Technologies, Mobility and Security (NTMS), May 2012.
[39] M., Ericson, “Total network base station energy cost vs. deployment,” in Proc. IEEE Vehicular Technology Conference (VTC Spring), May 2011.
[40] F., Richter, A. J., Fehske, and G. P., Fettweis, “Energy efficiency aspects of base station deployment strategies for cellular networks,” in Proc. IEEE Vehicular Technology Conference Fall (VTC 2009-Fall), September 2009.
[41] R., Vyas, H., Nishimoto, M., Tentzeris, Y., Kawahara, and T., Asami, “A battery-less, energy harvesting device for long range scavenging of wireless power from terrestrial TV broadcasts,” in Proc. IEEE MTT-S International Microwave Symposium Digest (MTT), June 2012.
[42] T., Sogorb, J., Vicente|Llario, J., Pelegri, R., Lajara, and J., Alberola, “Studying the feasibility of energy harvesting from broadcast RF station for WSN,” in Proc. IEEE Instrumentation and Measurement Technology Conference Proceedings (IMTC), May 2008, pp. 1360–1363.Google Scholar
[43] D., Niyato, P., Wang, D. I., Kim, W., Saad, and Z., Han, “Mobile energy sharing networks: performance analysis and optimization,” IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3519–3535, May 2016.Google Scholar
[44] T. D., Ngo, H., Raposo, and H., Schioler, “Potentially distributable energy: Towards energy autonomy in large population of mobile robots,” in Proc. International Symposium on Computational Intelligence in Robotics and Automation (CIRA), June 2007, pp. 206–211.Google Scholar
[45] A., Drenner, M., Janssen, and N., Papanikolopoulos, “Coordinating recharging of large scale robotic teams,” in Proc. IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), October 2009, pp. 1357–1362.Google Scholar
[46] L., He, P., Cheng, Y., Gu et al., “Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks,” in Proc. IEEE INFOCOM, April–May 2014, pp. 1195–1203.Google Scholar
[47] D., Gale and L. S., Shapley, “College admissions and the stability of marriage,” American Mathematical Monthly, vol. 69, pp. 9–14, 1962.Google Scholar
[48] A. E., Roth, U. G., Rothblum, and J. H. Vande, Vate, “Stable matchings, optimal assignments, and linear programming,” Journal of Mathematics of Operations Research, vol. 18, no. 4, pp. 803–828, November 1993.Google Scholar
[49] P. U., Tournoux, J., Leguay, F., Benbadis et al., “The accordion phenomenon: Analysis, characterization, and impact on DTN routing,” in IEEE INFOCOM, 2009.
[50] J., Leguay, A., Lindgren, J., Scott et al., CRAWDAD data set upmc/content (v. 2006-11-17), 2006 (available at http://crawdad.cs.dartmouth.edu).
[51] www.haggleproject.org

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×