13,797 research outputs found
A Study to Optimize Heterogeneous Resources for Open IoT
Recently, IoT technologies have been progressed, and many sensors and
actuators are connected to networks. Previously, IoT services were developed by
vertical integration style. But now Open IoT concept has attracted attentions
which achieves various IoT services by integrating horizontal separated devices
and services. For Open IoT era, we have proposed the Tacit Computing technology
to discover the devices with necessary data for users on demand and use them
dynamically. We also implemented elemental technologies of Tacit Computing. In
this paper, we propose three layers optimizations to reduce operation cost and
improve performance of Tacit computing service, in order to make as a
continuous service of discovered devices by Tacit Computing. In optimization
process, appropriate function allocation or offloading specific functions are
calculated on device, network and cloud layer before full-scale operation.Comment: 3 pages, 1 figure, 2017 Fifth International Symposium on Computing
and Networking (CANDAR2017), Nov. 201
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Neighbourhood-aware counter-based broadcast scheme for wireless ad hoc networks
Broadcasting is a vital operation in mobile ad hoc
networks (MANETs) and it is crucial to enhance its
efficiency to ensure successful deployment. Although
flooding is ideal for broadcast operations due to its
simplicity and high reachability it suffers from high
packet collision which can degrade network
performance severely. Counter-based broadcast
schemes have been introduced to alleviate the
limitations of flooding. This study introduces an
enhancement to counter-based broadcast by adjusting
the threshold value and the Random Assessment Delay
(RAD) using minimal neighbourhood information
Stable Infrastructure-based Routing for Intelligent Transportation Systems
Intelligent Transportation Systems (ITSs) have been instrumental
in reshaping transportation towards safer roads, seamless
logistics, and digital business-oriented services under the umbrella of
smart city platforms. Undoubtedly, ITS applications will demand
stable routing protocols that not only focus on Inter-Vehicle Communications
but also on providing a fast, reliable and secure interface to
the infrastructure. In this paper, we propose a novel stable infrastructure-
based routing protocol for urban VANETs. It enables vehicles
proactively to maintain fresh routes towards Road-Side Units
(RSUs) while reactively discovering routes to nearby vehicles. It
builds routes from highly stable connected intersections using a selection
policy which uses a new intersection stability metric. Simulation
experiments performed with accurate mobility and propagation
models have confirmed the efficiency of the new protocol and its
adaptability to continuously changing network status in the urban
environment
Scalable energy-efficient routing in mobile Ad hoc network
The quick deployment without any existing infrastructure makes mobile ad hoc networks (MANET) a striking choice for dynamic situations such as military and rescue operations, disaster recovery, and so on and so forth. However, routing remains one of the major issues in MANET due to the highly dynamic and distributed environment. Energy consumption is also a significant issue in ad hoc networks since the nodes are battery powered. This report discusses some major dominating set based approaches to perform energy efficient routing in mobile ad hoc networks. It also presents the performance results for each of these mentioned approaches in terms of throughput, average end to end delay and the life time in terms of the first node failure. Based on the simulation results, I identified the key issues in these protocols regarding network life time. In this report, I propose and discuss a new approach “Dynamic Dominating Set Generation Algorithm” (DDSG) to optimize the network life time. This algorithm dynamically selects dominating nodes during the process of routing and thus creates a smaller dominating set. DDSG algorithm thereby eliminates the energy consumption from the non-used dominating nodes. In order to further increase the network life time, the algorithm takes into consideration the threshold settings which helps to distribute the process of routing within the network. This helps to eliminate a single dominating node from getting drained out by continuous transmission and reception of packets. In this report, the detailed algorithmic design and performance results through simulation is discussed
A cyber-enabled mission-critical system for post-flood response:Exploiting TV white space as network backhaul links
A crucial problem in post-flood recovery actions is the ability to rapidly establish communication and collaboration among rescuers to conduct timely and effective search and rescue (SAR) mission given disrupted telecommunication infrastructure to support the service. Aimed at providing such proximity service (ProSe) for mission-critical data exchange in the post-flood environment, the majority of existing solutions rely heavily upon ad-hoc networking approaches, which suffer from restricted communication range and the limited scope of interaction. As an effort to broaden the ProSe coverage and expand integrated global-local information exchange in the post-flood SAR activities, this paper proposes a novel network architecture in the form of a cyber-enabled mission-critical system (CEMCS) for acquiring and communicating post-flood emergency data by exploiting TV white space spectrum as network backhaul links. The primary method of developing the proposed system builds upon a layered architecture of wireless local, regional and wide-area communications, and incorporates collaborative network components among these layers. The desirable functionalities of CEMCS are showcased through formulation and the development of an efficient global search strategy exploiting a wide range of collaboration among network agents. The simulation results demonstrate the capability of CEMCS to provide ProSe in the post-flood scenarios as reflected by reliable network performance (e.g., packet delivery ratio nearing 80%-90%) and the optimality of efficient search algorithm
- …