885 research outputs found

    Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks

    Get PDF
    This dissertation describes the CogNet architecture and five cognitive routing protocols designed to function within this architecture. In this document, I first provide detailed modeling and analysis of CogNet architecture and then provide the detailed approach, mathematical analysis, and simulation results for each of the developed cognitive routing protocols. The fundamental idea for these cognitive routing protocols is that a proper and adaptive network topology should be constructed from network nodes based on predictions using cognitive functions and past experience. The nodes in the cognitive radio network employ machine learning techniques to use past experience and make wise decisions by predicting future network conditions. The cognitive protocol architecture is a cross-layer optimized construct where the lower layer knowledge of the wireless medium is shared with the network layer. This dissertation investigates several intelligent approaches for cognitive routing protocols, such as the multi-channel optimized approach, the scalability optimized cognitive approach, the multi-path optimized approach, and the mobility optimized approach. Analytical and simulation results demonstrate that network performance can be increased significantly by applying cognitive routing protocols

    Exploiting the power of multiplicity: a holistic survey of network-layer multipath

    Get PDF
    The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive assumption of a single working path between a source and a destination. The lack of native multipath support constrains network performance even as the underlying network is richly connected and has redundant multiple paths. Computer networks can exploit the power of multiplicity, through which a diverse collection of paths is resource pooled as a single resource, to unlock the inherent redundancy of the Internet. This opens up a new vista of opportunities, promising increased throughput (through concurrent usage of multiple paths) and increased reliability and fault tolerance (through the use of multiple paths in backup/redundant arrangements). There are many emerging trends in networking that signify that the Internet's future will be multipath, including the use of multipath technology in data center computing; the ready availability of multiple heterogeneous radio interfaces in wireless (such as Wi-Fi and cellular) in wireless devices; ubiquity of mobile devices that are multihomed with heterogeneous access networks; and the development and standardization of multipath transport protocols such as multipath TCP. The aim of this paper is to provide a comprehensive survey of the literature on network-layer multipath solutions. We will present a detailed investigation of two important design issues, namely, the control plane problem of how to compute and select the routes and the data plane problem of how to split the flow on the computed paths. The main contribution of this paper is a systematic articulation of the main design issues in network-layer multipath routing along with a broad-ranging survey of the vast literature on network-layer multipathing. We also highlight open issues and identify directions for future work

    Towards video streaming in IoT environments: vehicular communication perspective

    Get PDF
    Multimedia oriented Internet of Things (IoT) enables pervasive and real-time communication of video, audio and image data among devices in an immediate surroundings. Today's vehicles have the capability of supporting real time multimedia acquisition. Vehicles with high illuminating infrared cameras and customized sensors can communicate with other on-road devices using dedicated short-range communication (DSRC) and 5G enabled communication technologies. Real time incidence of both urban and highway vehicular traffic environment can be captured and transmitted using vehicle-to-vehicle and vehicle-to-infrastructure communication modes. Video streaming in vehicular IoT (VSV-IoT) environments is in growing stage with several challenges that need to be addressed ranging from limited resources in IoT devices, intermittent connection in vehicular networks, heterogeneous devices, dynamism and scalability in video encoding, bandwidth underutilization in video delivery, and attaining application-precise quality of service in video streaming. In this context, this paper presents a comprehensive review on video streaming in IoT environments focusing on vehicular communication perspective. Specifically, significance of video streaming in vehicular IoT environments is highlighted focusing on integration of vehicular communication with 5G enabled IoT technologies, and smart city oriented application areas for VSV-IoT. A taxonomy is presented for the classification of related literature on video streaming in vehicular network environments. Following the taxonomy, critical review of literature is performed focusing on major functional model, strengths and weaknesses. Metrics for video streaming in vehicular IoT environments are derived and comparatively analyzed in terms of their usage and evaluation capabilities. Open research challenges in VSV-IoT are identified as future directions of research in the area. The survey would benefit both IoT and vehicle industry practitioners and researchers, in terms of augmenting understanding of vehicular video streaming and its IoT related trends and issues

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Trust Score based Optimized Cluster Routing (TSOCR) approach for Enhancing the Lifetime of Wireless Sensor Networks

    Get PDF
    Energy efficiency is the most significant obstacle that Wireless Sensor Networks (WSN) must overcome, and the desire for solutions that maximize energy efficiency will never go away. There are a variety of methods that can be utilized to improve energy efficiency, with data transmission as the primary driver of maximum energy consumption. The transmission of data from the source to destination nodes uses more energy. When the transmission of data is handled better, the energy efficiency is improved and the lifetime of the network is increased. The purpose of this research is to propose an Trust Score based Optimized Cluster Routing (TSOCR)  scheme for WSNs, which is based on Whale Optimization Algorithm (WOA). A total trust score is derived by combining the results of computing three distinct trust scores, such as the direct, indirect, and the most recent trust score. The path that has the highest trust score is chosen as the route and employed for data transmission. The effectiveness of the work is evaluated by looking at factors such as the rate of packet delivery, the latency, the amount of energy consumed and the lifetime of the network
    corecore