243 research outputs found

    Collaborative caching priority for processing requests in MANETs

    Get PDF
    Accessing distant sources in MANETs leads to poor performance and sometimes impossible due to regular disconnection of mobile hosts. Several approaches have been proposed to improve data accessibility and reduce delay in serving requests. These approaches adopted the collaborative caching techniques, enabling various mobile hosts to cache and share data items in their local caches. However, processing requests based on their classification have not been tackled in previous works to reduce the average delay. In this paper, we propose a collaborative caching priority approach, which serves requests based on their classifications either priority or normal. This is to ensure that priority requests are served with minimum cache discovery overhead and with less delay in fetching data items that are cached in MANETs. The experimental results show that the proposed approach improved the performance of collaborative caching and outperformed the cooperative and adaptive system (COACS), with a decrement of 30.42% in average delay and an increment of 21.26% in hit ratio

    A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries

    Get PDF
    Collaborative cache management in Mobile Ad Hoc Networks (MANETs) environment is considered as an efficient technique to increase data accessibility and availability, by sharing and coordination among mobile nodes. Due to nodes’ mobility, limited battery power and insufficient bandwidth, researchers addressed these challenges by developing many different collaborative caching schemes. The objective of this paper is to review various collaborative caching techniques in MANETs. Collaborative caching techniques are classified by methods used in serving queries, such as: hop-by-hop discovering, broadcasting messages, flooding, and query service differentiation. This review reveals that techniques utilizing hop-by-hop methods have better performance compared to others, especially techniques using additional strategies

    Improving the Performance of Mobile Ad Hoc Network Using a Combined Credit Risk and Collaborative Watchdog Method

    Get PDF
    In mobile ad hoc networks nodes can move freely and link node failures occur frequently This leads to frequent network partitions which may significantly degrade the performance of data access in ad hoc networks When the network partition occurs mobile nodes in one network are not able to access data hosted by nodes in other networks In mobile ad hoc network some nodes may selfishly decide only to cooperate partially or not at all with other nodes These selfish nodes could then reduce the overall data accessibility in the network In this work the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation is examined We term this selfish replica allocation A combined credit risk method collaborative watchdog is proposed to detect the selfish node and also apply the SCF tree based replica allocation method to handle the selfish replica allocation appropriately The proposed method improves the data accessibility reduces communication cost and average query delay and also to reduce the detection time and to improve the accuracy of watchdogs in the collaborative metho

    Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN Networks

    Full text link
    Quality of Service (QoS) in the IP world mainly manages forwarding resources, i.e., link capacities and buffer spaces. In addition, Information Centric Networking (ICN) offers resource dimensions such as in-network caches and forwarding state. In constrained wireless networks, these resources are scarce with a potentially high impact due to lossy radio transmission. In this paper, we explore the two basic service qualities (i) prompt and (ii) reliable traffic forwarding for the case of NDN. The resources we take into account are forwarding and queuing priorities, as well as the utilization of caches and of forwarding state space. We treat QoS resources not only in isolation, but correlate their use on local nodes and between network members. Network-wide coordination is based on simple, predefined QoS code points. Our findings indicate that coordinated QoS management in ICN is more than the sum of its parts and exceeds the impact QoS can have in the IP world

    A cross-layer implementation of Ad hoc On-demand Distance Vector routing (AODV) protocol

    Get PDF
    Mobile Ad hoc Networks (MANETs) are networks which will form the basis for the ubiquitous data access because of their ease of deployment. Due to the dynamic nature of a MANET, routing is one of the most critical elements of MANET. Routing protocols for MANET can be broadly classified as a proactive routing protocol or a reactive routing protocol. In the proactive routing protocols, mobile nodes periodically exchange routing information among themselves. Hence proactive routing protocols generate high overhead messages in the network. On the other hand, reactive routing protocols work on-demand. Thereby generating less number of overhead messages in the network compared to proactive routing protocols. But reactive routing protocols use a global search mechanism called \u27flooding\u27 during the route discovery process. \u27Flooding\u27 generates a huge number of overhead messages in the network. Those overhead messages affect the performance of reactive routing protocols in term of network throughput. That kind of performance problem is called \u27scaling\u27 problem. Ad hoc On-demand Distance Vector Routing with Cross-Layer Design (AODV-CL) protocol has been proposed to solve this scaling problem. The AODV routing protocol has been modified to implement AODV-CL protocol. AODV-CL protocol reduces \u27flooding\u27 problem of reactive routing protocols by limiting the number of nodes that should participate in route discovery process based on their status in the network and also avoiding congested area of the network. It is shown that AODV-CL protocol reduces overhead messages by 73% and reduces end-to-end delay per packet by 32% compared to regular AODV protocol. I

    Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges

    Get PDF
    International audienceInformation-Centric Networking (ICN) has been proposed as one of the future Internet architectures. It is poised to address the challenges faced by today's Internet that include, but not limited to, scalability, addressing, security, and privacy. Furthermore, it also aims at meeting the requirements for new emerging Internet applications. To realize ICN, Named Data Networking (NDN) is one of the recent implementations of ICN that provides a suitable communication approach due to its clean slate design and simple communication model. There are a plethora of applications realized through ICN in different domains where data is the focal point of communication. One such domain is Intelligent Transportation System (ITS) realized through Vehicular Ad hoc NETwork (VANET) where vehicles exchange information and content with each other and with the infrastructure. To date, excellent research results have been yielded in the VANET domain aiming at safe, reliable, and infotainment-rich driving experience. However, due to the dynamic topologies, host-centric model, and ephemeral nature of vehicular communication, various challenges are faced by VANET that hinder the realization of successful vehicular networks and adversely affect the data dissemination, content delivery, and user experiences. To fill these gaps, NDN has been extensively used as underlying communication paradigm for VANET. Inspired by the extensive research results in NDN-based VANET, in this paper, we provide a detailed and systematic review of NDN-driven VANET. More precisely, we investigate the role of NDN in VANET and discuss the feasibility of NDN architecture in VANET environment. Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET. Furthermore, we discuss the existing standards, solutions, and simulation tools used in NDN-based VANET. Finally, we also identify open challenges and issues faced by NDN-driven VANET and highlight future research directions that should be addressed by the research community

    Quality management of surveillance multimedia streams via federated SDN controllers in Fiwi-iot integrated deployment environments

    Get PDF
    Traditionally, hybrid optical-wireless networks (Fiber-Wireless - FiWi domain) and last-mile Internet of Things edge networks (Edge IoT domain) have been considered independently, with no synergic management solutions. On the one hand, FiWi has primarily focused on high-bandwidth and low-latency access to cellular-equipped nodes. On the other hand, Edge IoT has mainly aimed at effective dispatching of sensor/actuator data among (possibly opportunistic) nodes, by using direct peer-to-peer and base station (BS)-assisted Internet communications. The paper originally proposes a model and an architecture that loosely federate FiWi and Edge IoT domains based on the interaction of FiWi and Edge IoT software defined networking controllers: The primary idea is that our federated controllers can seldom exchange monitoring data and control hints the one with the other, thus mutually enhancing their capability of end-to-end quality-aware packet management. To show the applicability and the effectiveness of the approach, our original proposal is applied to the notable example of multimedia stream provisioning from surveillance cameras deployed in the Edge IoT domain to both an infrastructure-side server and spontaneously interconnected mobile smartphones; our solution is able to tune the BS behavior of the FiWi domain and to reroute/prioritize traffic in the Edge IoT domain, with the final goal to reduce latency. In addition, the reported application case shows the capability of our solution of joint and coordinated exploitation of resources in FiWi and Edge IoT domains, with performance results that highlight its benefits in terms of efficiency and responsiveness

    Security analysis of JXME-Proxyless version

    Get PDF
    JXME es la especificación de JXTA para dispositivos móviles con J2ME. Hay dos versiones diferentes de la aplicación JXME disponibles, cada una específica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades. El principal valor de JXME es su simplicidad para crear peer-to-peer (P2P) en dispositivos limitados. Además de evaluar las funciones JXME, también es importante tener en cuenta el nivel de seguridad por defecto que se proporciona. Este artículo presenta un breve análisis de la situación actual de la seguridad en JXME, centrándose en la versión JXME-Proxyless, identifica las vulnerabilidades existentes y propone mejoras en este campo.JXME és l'especificació de JXTA per a dispositius mòbils amb J2ME. Hi ha dues versions diferents de l'aplicació JXME disponibles, cada una d'específica per a un determinat conjunt de dispositius, d'acord amb les seves capacitats. El principal valor de JXME és la seva simplicitat per crear peer-to-peer (P2P) en dispositius limitats. A més d'avaluar les funcions JXME, també és important tenir en compte el nivell de seguretat per defecte que es proporciona. Aquest article presenta un breu anàlisis de la situació actual de la seguretat en JXME, centrant-se en la versió JXME-Proxyless, identifica les vulnerabilitats existents i proposa millores en aquest camp.JXME is the JXTA specification for mobile devices using J2ME. Two different flavors of JXME implementation are available, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxyless version, identifies existing vulnerabilities and proposes further improvements in this field
    corecore