60,926 research outputs found
Routing protocols for self-organizing hierarchical ad-hoc wireless networks
âA novel self-organizing hierarchical architecture is proposed for improving the scalability properties of adhoc wireless networks. This paper focuses on the design and evaluation of routing protocols applicable to this class of hierarchical ad-hoc networks. The performance of a hierarchical network with the popular dynamic source routing (DSR) protocol is evaluated and compared with that of a conventional âflatâ ad-hoc networks using an ns-2 simulation model. The results for an example sensor network scenario show significant capacity increases with the hierarchical architecture (âŒ4:1). Alternative routing metrics that account for energy efficiency are also considered briefly, and the effect on user performance and system capacity are given for a specific example
Recommended from our members
Hierarchical wireless framework for real-time collaborative generation and distribution of telemetry data
This project introduces a novel multidisciplinary approach combining Vehicular Ad Hoc Networks and Granular Computing, to the data processing and information generation problem in large urban traffic systems. It addresses the challenge of realtime information generation and dissemination in such systems by designing and investigating a hierarchical real-time information framework. The research work is complemented by designing and developing a simulator for such a system, which provides a simulation environment for the model developed. The proposed multidisciplinary hierarchical real-time information processing and dissemination system framework utilises results from two different areas of study, which are Vehicular Ad Hoc Networks (VANETS) and Granular Computing concepts. Furthermore, a new geographically constrained VANET topology for information generation is proposed, simulated and investigated
A Survey of Applying Ad Hoc Wireless Sensor Actuator Networks to Enhance Context-Awareness in Environmental Management Systems
Sensor mesh networking is set to be one of the key tools for the future of Ambient Intelligence (AmI) due to new emerging technologies in Ad hoc Wireless Sensor Networks (AWSNs). AWSNs symbolize the new generation of sensor networks with many promising advantages applicable to most networked environments. Unfortunately, however, these practical technologies have some technical problems and, as a consequence, this fascinating field has created novel and interesting challenges, which in turn, have inspired many ongoing research projects and more are likely to follow. Almost certainly, there will be notable improvements in the management of control/actuator networks as a consequence of enhancing the sensitivity capabilities of systems. With an emphasis on Ad hoc Wireless Sensor Actuator Networks (AWSANs) this study presents a systematic analysis of the different existing techniques to improve such systems. It also discusses, analyzes and summarizes the advantages these technologies offer in certain applications and presents a generic solution, in the form of a case study, for an AmI system to enhance the overall environmental management of a campus based on a hierarchical network using an AWSAN
Multi-Perspective Relevance Matching with Hierarchical ConvNets for Social Media Search
Despite substantial interest in applications of neural networks to
information retrieval, neural ranking models have only been applied to standard
ad hoc retrieval tasks over web pages and newswire documents. This paper
proposes MP-HCNN (Multi-Perspective Hierarchical Convolutional Neural Network)
a novel neural ranking model specifically designed for ranking short social
media posts. We identify document length, informal language, and heterogeneous
relevance signals as features that distinguish documents in our domain, and
present a model specifically designed with these characteristics in mind. Our
model uses hierarchical convolutional layers to learn latent semantic
soft-match relevance signals at the character, word, and phrase levels. A
pooling-based similarity measurement layer integrates evidence from multiple
types of matches between the query, the social media post, as well as URLs
contained in the post. Extensive experiments using Twitter data from the TREC
Microblog Tracks 2011--2014 show that our model significantly outperforms prior
feature-based as well and existing neural ranking models. To our best
knowledge, this paper presents the first substantial work tackling search over
social media posts using neural ranking models.Comment: AAAI 2019, 10 page
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
This thesis presents a research whose objective is to design an intrusion detection model for Mobile Ad hoc NETworks (MANET). MANET is an autonomous system consisting of a group of mobile nodes with no infrastructure support. The MANET environment is particularly vulnerable because of the characteristics of mobile ad hoc networks such as open medium, dynamic topology, distributed cooperation, and constrained capability. Unfortunately, the traditional
mechanisms designed for protecting networks are not directly applicable to MANETs without modifications. In the past decades, machine learning methods have been successfully used in several intrusion detection methods
because of their ability to discover and detect novel attacks. This research investigates the use of a promising technique from machine learning to designing the most suitable intrusion detection for this challenging network type. The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. Moreover, the algorithm can provide a graded confidence that indicates the reliability of the classification. In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. Feature selection is undertaken to select the relevant subsets of features to build an efficient prediction model and improve intrusion detection performance by removing irrelevant features. The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. Traditional intrusion detection techniques have had trouble dealing with dynamic environments. In particular, issues such as collects real time attack related audit data and cooperative global detection. Therefore, the researcher is motivated to design a new intrusion detection architecture which involves new detection technique to efficiently detect the abnormalities in the ad hoc networks. The proposed model has distributed and cooperative hierarchical architecture, where nodes communicate with their region gateway node to make decisions. To validate the research, the researcher presents case study using GLOMOSIM simulation platform with AODV ad hoc routing protocols. Various active attacks are implemented. A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy
Multicast outing protocols and architectures in mobile ad-hoc wireless networks
The basic philosophy of personal communication services is to provide user-to-user, location independent communication services. The emerging group communication wireless applications, such as multipoint data dissemination and multiparty conferencing tools have made the design and development of efficient multicast techniques in mobile ad-hoc networking environments a necessity and not just a desire. Multicast protocols in mobile adhoc networks have been an area of active research for the past few years.
In this dissertation, protocols and architectures for supporting multicast services are proposed, analyzed and evaluated in mobile ad-hoc wireless networks. In the first chapter, the activities and recent advances are summarized in this work-in-progress area by identifying the main issues and challenges that multicast protocols are facing in mobile ad-hoc networking environments and by surveying several existing multicasting protocols. a classification of the current multicast protocols is presented, the functionality of the individual existing protocols is discussed, and a qualitative comparison of their characteristics is provided according to several distinct features and performance parameters.
In the second chapter, a novel mobility-based clustering strategy that facilitates the support of multicast routing and mobility management is presented in mobile ad-hoc networks. In the proposed structure, mobile nodes are organized into nonoverlapping clusters which have adaptive variable-sizes according to their respective mobility. The mobility-based clustering (MBC) approach which is proposed uses combination of both physical and logical partitions of the network (i.e. geographic proximity and functional relation between nodes, such as mobility pattern etc.).
In the third chapter, an entropy-based modeling framework for supporting and evaluating the stability is proposed in mobile ad-hoc wireless networks. The basic motivations of the proposed modeling approach stem from the commonality observed in the location uncertainty in mobile ad-hoc wireless networks and the concept of entropy.
In the fourth chapter, a Mobility-based Hybrid Multicast Routing (MHMR) protocol suitable for mobile ad-hoc networks is proposed. The MHMR uses the MBC algorithm as the underlying structure. The main features that the proposed protocol introduces are the following: a) mobility based clustering and group based hierarchical structure, in order to effectively support the stability and scalability, b) group based (limited) mesh structure and forwarding tree concepts, in order to support the robustness of the mesh topologies which provides limited redundancy and the efficiency of tree forwarding simultaneously, and c) combination of proactive and reactive concepts which provide the low route acquisition delay of proactive techniques and the low overhead of reactive methods.
In the fifth chapter, an architecture for supporting geomulticast services with high message delivery accuracy is presented in mobile ad-hoc wireless networks. Geomulticast is a specialized location-dependent multicasting technique, where messages are multicast to some specific user groups within a specific zone. An analytical framework which is used to evaluate the various geomulticast architectures and protocols is also developed and presented. The last chapter concludes the dissertation
The design and simulation of routing protocols for mobile ad hoc networks.
Thesis (Ph.D.)-University of Natal, Durban, 2000.This thesis addresses a novel type of network known as a mobile ad hoc
network. A mobile ad hoc network is a collection of entirely mobile nodes
that can establish communication in the absence of any fixed infrastructure.
Envisioned applications of these networks include virtual classrooms, emergency
relief operations, military tactical communications, sensor networks
and community networking.
Mobile ad hoc networking poses several new challenges in the design of
network protocols. This thesis focuses on the routing problem. The main
challenges in the design of a routing protocol for mobile ad hoc networks result
from them having limited resources and there being frequent topological
changes that occur unpredictably. Moreover, there is no fixed infrastructure
that supports routing. The conventional routing protocols are not generally
suitable for mobile ad hoc networks, as they cannot react quickly to the
changing network topology, cause excessive communication and computation,
or converge very slowly creating routing loops.
In this thesis we propose two classes of routing schemes for mobile ad hoc
networks. The first class is known as Limited Flooding Protocol. The protocol
is fully reactive and does not require the computation of routing tables. It
uses some basic principles of flooding, but reduces the communication overhead
by restricting packet propagation through the network. Several variations
of limited flooding are considered including deterministic, randomised
and priority-based mechanisms. The main advantage of this protocol is that
it can be used in networks with unpredictable topological changes and highly
mobile nodes, since maintaining routing table at the intermediate nodes is
not required.
The second class of routing protocols is based on hierarchical clustering
architecture and is intended for use in a relatively low mobility environment.
The basic idea of this protocol is to partition the entire network into smaller
units known as clusters and define routing mechanisms both within and between
clusters using a hierarchical architecture. The main advantage of this
architecture is reduction of storage requirements of routing information, communication
overhead and computational overhead at each node.
Discrete-event simulation is used for modelling and performance evaluation.
Various options and variations of the protocols are examined in theâŠ[Page 2 of abstract is missing.]Page 2 of abstract is missing
- âŠ