Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Nekovee, Maziar (2008)
Languages: English
Types: Preprint
Subjects: Computer Science - Distributed, Parallel, and Cluster Computing, Computer Science - Computational Engineering, Finance, and Science

Classified by OpenAIRE into

Wireless Fidelity (WiFi) is the fastest growing wireless technology to date. In addition to providing wire-free connectivity to the Internet WiFi technology also enables mobile devices to connect directly to each other and form highly dynamic wireless adhoc networks. Such distributed networks can be used to perform cooperative communication tasks such ad data routing and information dissemination in the absence of a fixed infrastructure. Furthermore, adhoc grids composed of wirelessly networked portable devices are emerging as a new paradigm in grid computing. In this paper we review computational and algorithmic challenges of high-fidelity simulations of such WiFi-based wireless communication and computing networks, including scalable topology maintenance, mobility modelling, parallelisation and synchronisation. We explore similarities and differences between the simulations of these networks and simulations of interacting many-particle systems, such as molecular dynamics (MD) simulations. We show how the cell linked-list algorithm which we have adapted from our MD simulations can be used to greatly improve the computational performance of wireless network simulators in the presence of mobility, and illustrate with an example from our simulation studies of worm attacks on mobile wireless adhoc networks.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] A. Goldsmith Wireless Communications, Cambridge University Press, 2005.
    • [2] Nomads at last: A special report on mobile telecoms, The Economist, 1-18, April 12th, 2008.
    • [3] M. S. Gast 802.11 Wireless Networks, Second Edition, O'Reily, 2005; W. Stalling, Wireless Communications Networks, Prentice Hall, 2005.
    • [4] R. Hekmat, Adhoc networks: Fundamental properties and network topologies, Springer, 2006.
    • [5] D. Grigoras and M. Riordan, Future Generation Computer Systems 23, 990- 996, 2007.
    • [6] Y. Zhang, J. Luo, H. Hou (eds.), Wireless Mesh Networking: Architectures,Protocols and Standards, Auerbach Publications, NY, 2007.
    • [7] M. Nekovee, Proc. Workshop on Ubiquitious Computing and e-Research, Edinburgh, UK, May 2005.
    • [8] L. W. McKnight, J. Howison, S. Bradner, Wireless grids: Distributed resource sharing by mobile, nomadic, and fixed devices, IEEE Internet Computing, Special Issue on Wireless grids, 24-31, July/August 2004.
    • [9] R. Moreno-Vozmediano, A hybrid mechanism for resource/service discovery in ad-hoc grids, Future Generation Computer Systems, 2008 (article in press).
    • [10] The Network Simulator - ns-2, www.isi.edu/nsnam/ns.
    • [11] G. Riley, Proc. of the 2003 ACM Winter Simulation Conference, 2003.
    • [12] R. Pastor-Satorras and A. Vespignani, Evolution and Structure of the Internet: A Statistical Physics Approach, Cambridge University Press, 2006.
    • [13] U. O. Ibom, Proc. of the IEEE Information Networking, 1-5, 2008.
    • [14] J. J. Garcia, Future Generation Computer Systems, 81-93,1988.
    • [15] T. Rappaport, Wireless Communications, Principle and Parctice, Prentice-Hall, 2000.
    • [16] M. Takai, J. Martin, and R. Bagrodia, Proc. of ACM MOBIHOC'01, 87-94, 2001.
    • [17] Z. Ji, J. Zhou, M. Takai, J. Martin, and R. Bagrodia, Proc. of the 18th Workshop on Parallel and Distributed Simulation (PASDs'04).
    • [18] M. Penrose, Random Geometric Graphs, Oxford University Press, Oxford, 2003.
    • [19] See, e.g., T. Camp, J. Boleng, and V. Davis, Wireless Communication and Mobile Computing, Special Issue on Mobile Adhoc Networking: Research, Trends and Applications 2, 483-502, 2002.
    • [20] M. Musolesi and C. Mascolo, Mobile Computing and Communications Review 1, 1-12,2006.
    • [21] P. Ball, Critical Mass: How One Things Leads to Anorther, Arrow Books, 2006.
    • [22] D. Helbig, Rev. Mod. Phys. 73, 1067-1141 (2001).
    • [23] X. Zeng, R. Bagrodia, M. Gerla, Proc. 12th Workshop on Parallel and Distributed Simulations (PADS 98), 154-161, 1998.
    • [25] L. Bononi, M. Di Felice, G. D. Angelo, M. Bracuto, L. Donatiello, Computer Networks 52, 155-179, 2008.
    • [26] P. Szor, The Art of Computer Virus Research and Defense, Symantec Press, 2006.
    • [27] M. Nekovee, Proc. IEEE Vehicular Technology Conferenc (VTC07-Spring), 2486-2490, 2007.
    • [28] M. P. Allen and D.J. Tildesley, Computer Simulations of Liquids, Clarendon, Oxford, 1987.
    • [29] R. Fujimoto, Parallel and Distributed Simulation Systems , WileyInterscience,NY, 1999.
    • [30] Z. Ji, J. Zhou, M. Takai, J. Martin, R. Bogardia, Proc. 18th IEEE Workshop on Parallel and Distributed Simulations (PADS'04), 2004.
    • [31] L. Bononi, M. Di Felice, M. Bertini, E. Croci, Proc. of MSWIM'06, Torremolinos, Spain, 28-35, 2004.
    • [32] G. Korniss, M. A. Novotny, H. Guclu, Z. Toroczkai and P. A. Rikvold, Science 299, 677 (2003).
    • [33] M. Hypponen, Scientific American, 70-77, November 2006.
    • [34] J. Kleinberg, Nature 449, 287-288, 2007.
    • [35] M. Nekovee, New J. Phys. 9, 189, 2007.
    • [36] N. T. J. Bailey, The Mathematical Theory of Epidemics, Hafner Publishing, 1957.
    • [37] K. Hwang, Y-k Kwok, S. Song, M. C. Y. Chen, Y. Chen, R. Zhou and X. Lou, GridSec: Trusted grid computing with security binding and self-defence against network worms and DDoS attacks, Proc. International Conference on Grid Computing Security and Resource Management (GSRM'05), Atlanta, USA, may 2005.
    • [38] L. F. Perrone and D. M. Nicol, Proc. IEEE MASCOTS 2000.
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

Share - Bookmark

Cite this article

Collected from