139,280 research outputs found

    Dynamic Queue Utilization Based MAC for multi-hop Ad Hoc networks

    Get PDF
    The end-to-end throughput in single flow multi-hop Ad Hoc networks decays rapidly with path length. Along the path, the success rate of delivering packets towards the destination decreases due to higher contention, interference, limited buffer size and limited shared bandwidth constraints. In such environments the queues fill up faster in nodes closer to the source than in the nodes nearer the destination. In order to reduce buffer overflow and improve throughput for a saturated network, this paper introduces a new MAC protocol named Dynamic Queue Utilization Based Medium Access Control (DQUB-MAC). The protocol aims to prioritise access to the channel for queues with higher utilization and helps in achieving higher throughput by rapidly draining packets towards the destination. The proposed MAC enhances the performance of an end-to-end data flow by up to 30% for a six hop transmission in a chain topology and is demonstrated to remain competitive for other network topologies and for a variety of packet sizes

    Developing an Efficient DMCIS with Next-Generation Wireless Networks

    Get PDF
    The impact of extreme events across the globe is extraordinary which continues to handicap the advancement of the struggling developing societies and threatens most of the industrialized countries in the globe. Various fields of Information and Communication Technology have widely been used for efficient disaster management; but only to a limited extent though, there is a tremendous potential for increasing efficiency and effectiveness in coping with disasters with the utilization of emerging wireless network technologies. Early warning, response to the particular situation and proper recovery are among the main focuses of an efficient disaster management system today. Considering these aspects, in this paper we propose a framework for developing an efficient Disaster Management Communications and Information System (DMCIS) which is basically benefited by the exploitation of the emerging wireless network technologies combined with other networking and data processing technologies.Comment: 6 page

    A Secure Lightweight Approach of Node Membership Verification in Dense HDSN

    Full text link
    In this paper, we consider a particular type of deployment scenario of a distributed sensor network (DSN), where sensors of different types and categories are densely deployed in the same target area. In this network, the sensors are associated with different groups, based on their functional types and after deployment they collaborate with one another in the same group for doing any assigned task for that particular group. We term this sort of DSN as a heterogeneous distributed sensor network (HDSN). Considering this scenario, we propose a secure membership verification mechanism using one-way accumulator (OWA) which ensures that, before collaborating for a particular task, any pair of nodes in the same deployment group can verify each other-s legitimacy of membership. Our scheme also supports addition and deletion of members (nodes) in a particular group in the HDSN. Our analysis shows that, the proposed scheme could work well in conjunction with other security mechanisms for sensor networks and is very effective to resist any adversary-s attempt to be included in a legitimate group in the network.Comment: 6 page
    • โ€ฆ
    corecore