1,713 research outputs found

    Light Load Path Selection Techniques for Control Congestion in MANET (ENBA)

    Get PDF
    The nodes have limited bandwidth and processing capability. The routing protocols cannot handle the congestion due to heavy load in mobile ad hoc networks. Several routes are established in the network, and some intermediate nodes are common. The dynamic behaviour of the network creates problems for strong link establishment. The routing protocol establishes the connection between the sender and receiver. The efficient routing approach uses the concept of load balancing to reduce packet loss in a network. The heavy load on the network affects the node’s buffer capacity and link capacity. The research proposed the Effective Network Behavior Analyze (ENBA) for route sections to control congestion in MANET. This paper’s effort is driven by the idea of considering several aspects of the routing design of Mobile Ad hoc Networks (MANETs) in a unified manner. ENBA is a routing strategy that uses the shortest path for routing and balances the load by managing incoming and outgoing packets on links and nodes. In this routing scheme, the shortest path measures the buffer capacity of the nodes with higher TTL values selected for sending the data packets in the network. The link capacity is based on the flow of packets in the network. Queue optimisation is a continuous optimisation in which we count the number of packets incoming and decide the link reliability in a dynamic network. The performance of ENBA is compared with the Ad hoc On-demand Multipath Distance Vector -Modified (AOMDV-M) routing protocol. The ENDA strategy outperforms the competition in terms of performance over a shorter period. In the proposed technique, performance matrices like PDR, overhead, and delay provide better results than the previous AOMDV-M routing approach

    Total order in opportunistic networks

    Get PDF
    Opportunistic network applications are usually assumed to work only with unordered immutable messages, like photos, videos, or music files, while applications that depend on ordered or mutable messages, like chat or shared contents editing applications, are ignored. In this paper, we examine how total ordering can be achieved in an opportunistic network. By leveraging on existing dissemination and causal order algorithms, we propose a commutative replicated data type algorithm on the basis of Logoot for achieving total order without using tombstones in opportunistic networks where message delivery is not guaranteed by the routing layer. Our algorithm is designed to use the nature of the opportunistic network to reduce the metadata size compared to the original Logoot, and even to achieve in some cases higher hit rates compared to the dissemination algorithms when no order is enforced. Finally, we present the results of the experiments for the new algorithm by using an opportunistic network emulator, mobility traces, and Wikipedia pages.Peer ReviewedPostprint (author's final draft

    Sporadic cloud-based mobile augmentation on the top of a virtualization layer: a case study of collaborative downloads in VANETs

    Get PDF
    Current approaches to Cloud-based Mobile Augmentation (CMA) leverage (cloud-based) resources to meet the requirements of rich mobile applications, so that a terminal (the so-called application node or AppN) can borrow resources lent by a set of collaborator nodes (CNs). In the most sophisticated approaches proposed for vehicular scenarios, the collaborators are nearby vehicles that must remain together near the application node because the augmentation service is interrupted when they move apart. This leads to disruption in the execution of the applications and consequently impoverishes the mobile users’ experience. This paper describes a CMA approach that is able to restore the augmentation service transparently when AppNs and CNs separate. The functioning is illustrated by a NaaS model where the AppNs access web contents that are collaboratively downloaded by a set of CNs, exploiting both roadside units and opportunistic networking. The performance of the resulting approach has been evaluated via simulations, achieving promising results in terms of number of downloads, average download times, and network overheadMinisterio de Educación y Ciencia | Ref. TIN2017-87604-

    Decentralized and adaptive sensor data routing

    Get PDF
    Wireless sensor network (WSN) has been attracting research efforts due to the rapidly increasing applications in military and civilian fields. An important issue in wireless sensor network is how to send information in an efficient and adaptive way. Information can be directly sent back to the base station or through a sequence of intermediate nodes. In the later case, it becomes the problem of routing. Current routing protocols can be categorized into two groups, namely table-drive (proactive) routing protocols and source-initiated on-demand (reactive) routing. For ad hoc wireless sensor network, routing protocols must deal with some unique constraints such as energy conservation, low bandwidth, high error rate and unpredictable topology, of which wired network might not possess. Thus, a routing protocol, which is energy efficient, self-adaptive and error tolerant is highly demanded. A new peer to peer (P2P) routing notion based on the theory of cellular automata has been put forward to solve this problem. We proposed two different models, namely Spin Glass (Physics) inspired model and Multi-fractal (Chemistry) inspired model. Our new routing models are distributed in computation and self-adaptive to topological disturbance. All these merits can not only save significant amount of communication and computation cost but also well adapt to the highly volatile environment of ad hoc WSN. With the cellular automata Cantor modeling tool, we implemented two dynamic link libraries (DLL) in C++ and the corresponding graphic display procedures in Tcl/tk. Results of each model’s routing ability are discussed and hopefully it will lead to new peer to peer algorithms, which can combine the advantages of current models
    • …
    corecore