13,797 research outputs found

    A Study to Optimize Heterogeneous Resources for Open IoT

    Full text link
    Recently, IoT technologies have been progressed, and many sensors and actuators are connected to networks. Previously, IoT services were developed by vertical integration style. But now Open IoT concept has attracted attentions which achieves various IoT services by integrating horizontal separated devices and services. For Open IoT era, we have proposed the Tacit Computing technology to discover the devices with necessary data for users on demand and use them dynamically. We also implemented elemental technologies of Tacit Computing. In this paper, we propose three layers optimizations to reduce operation cost and improve performance of Tacit computing service, in order to make as a continuous service of discovered devices by Tacit Computing. In optimization process, appropriate function allocation or offloading specific functions are calculated on device, network and cloud layer before full-scale operation.Comment: 3 pages, 1 figure, 2017 Fifth International Symposium on Computing and Networking (CANDAR2017), Nov. 201

    A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Full text link
    This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanismsComment: 15 page

    Neighbourhood-aware counter-based broadcast scheme for wireless ad hoc networks

    Get PDF
    Broadcasting is a vital operation in mobile ad hoc networks (MANETs) and it is crucial to enhance its efficiency to ensure successful deployment. Although flooding is ideal for broadcast operations due to its simplicity and high reachability it suffers from high packet collision which can degrade network performance severely. Counter-based broadcast schemes have been introduced to alleviate the limitations of flooding. This study introduces an enhancement to counter-based broadcast by adjusting the threshold value and the Random Assessment Delay (RAD) using minimal neighbourhood information

    Stable Infrastructure-based Routing for Intelligent Transportation Systems

    Get PDF
    Intelligent Transportation Systems (ITSs) have been instrumental in reshaping transportation towards safer roads, seamless logistics, and digital business-oriented services under the umbrella of smart city platforms. Undoubtedly, ITS applications will demand stable routing protocols that not only focus on Inter-Vehicle Communications but also on providing a fast, reliable and secure interface to the infrastructure. In this paper, we propose a novel stable infrastructure- based routing protocol for urban VANETs. It enables vehicles proactively to maintain fresh routes towards Road-Side Units (RSUs) while reactively discovering routes to nearby vehicles. It builds routes from highly stable connected intersections using a selection policy which uses a new intersection stability metric. Simulation experiments performed with accurate mobility and propagation models have confirmed the efficiency of the new protocol and its adaptability to continuously changing network status in the urban environment

    Scalable energy-efficient routing in mobile Ad hoc network

    Get PDF
    The quick deployment without any existing infrastructure makes mobile ad hoc networks (MANET) a striking choice for dynamic situations such as military and rescue operations, disaster recovery, and so on and so forth. However, routing remains one of the major issues in MANET due to the highly dynamic and distributed environment. Energy consumption is also a significant issue in ad hoc networks since the nodes are battery powered. This report discusses some major dominating set based approaches to perform energy efficient routing in mobile ad hoc networks. It also presents the performance results for each of these mentioned approaches in terms of throughput, average end to end delay and the life time in terms of the first node failure. Based on the simulation results, I identified the key issues in these protocols regarding network life time. In this report, I propose and discuss a new approach “Dynamic Dominating Set Generation Algorithm” (DDSG) to optimize the network life time. This algorithm dynamically selects dominating nodes during the process of routing and thus creates a smaller dominating set. DDSG algorithm thereby eliminates the energy consumption from the non-used dominating nodes. In order to further increase the network life time, the algorithm takes into consideration the threshold settings which helps to distribute the process of routing within the network. This helps to eliminate a single dominating node from getting drained out by continuous transmission and reception of packets. In this report, the detailed algorithmic design and performance results through simulation is discussed

    A cyber-enabled mission-critical system for post-flood response:Exploiting TV white space as network backhaul links

    Get PDF
    A crucial problem in post-flood recovery actions is the ability to rapidly establish communication and collaboration among rescuers to conduct timely and effective search and rescue (SAR) mission given disrupted telecommunication infrastructure to support the service. Aimed at providing such proximity service (ProSe) for mission-critical data exchange in the post-flood environment, the majority of existing solutions rely heavily upon ad-hoc networking approaches, which suffer from restricted communication range and the limited scope of interaction. As an effort to broaden the ProSe coverage and expand integrated global-local information exchange in the post-flood SAR activities, this paper proposes a novel network architecture in the form of a cyber-enabled mission-critical system (CEMCS) for acquiring and communicating post-flood emergency data by exploiting TV white space spectrum as network backhaul links. The primary method of developing the proposed system builds upon a layered architecture of wireless local, regional and wide-area communications, and incorporates collaborative network components among these layers. The desirable functionalities of CEMCS are showcased through formulation and the development of an efficient global search strategy exploiting a wide range of collaboration among network agents. The simulation results demonstrate the capability of CEMCS to provide ProSe in the post-flood scenarios as reflected by reliable network performance (e.g., packet delivery ratio nearing 80%-90%) and the optimality of efficient search algorithm
    • …
    corecore