1,433 research outputs found
AN APPROACH FOR FAULT DETECTION AND FAULT MANAGEMENT IN THE WIRELESS SENSOR NETWORK TO EXTEND NETWORK LIFETIME
A mobile wireless ad hoc sensor network (MANET) consists of a group of homogeneous or heterogeneous mobile communicating hosts that form an arbitrary network interconnected via by means of several wireless communication media without any fixed infrastructure. In such network the delivery of the data packet from source to destination may fail for various reasons and major due to failure-prone environment of networks. This may happens due to the topology changes, node failure due to battery exhaust, failure of the communication module in the wireless node and results in the link failure. This paper addressed the major problem of link failure in the WSN and with the aim of providing robust solution so as to satisfy the stern end-to-end requirements of QoS-based communication networks. In this paper we modifies existing fully distributed cluster-based routing algorithm by addressing local recovery for the link failure. Performance of this new fault-tolerant fully distributed cluster-based routing algorithm is evaluated by simulating it in NS2 environment and we show that it performs better than the existing algorithm and provide better solution for fault detection and fault management along the QoS paths
AN APPROACH FOR FAULT DETECTION AND FAULT MANAGEMENT IN THE WIRELESS SENSOR NETWORK TO EXTEND NETWORK LIFETIME
A mobile wireless ad hoc sensor network (MANET) consists of a group of homogeneous or heterogeneous mobile communicating hosts that form an arbitrary network interconnected via by means of several wireless communication media without any fixed infrastructure. In such network the delivery of the data packet from source to destination may fail for various reasons and major due to failure-prone environment of networks. This may happens due to the topology changes, node failure due to battery exhaust, failure of the communication module in the wireless node and results in the link failure. This paper addressed the major problem of link failure in the WSN and with the aim of providing robust solution so as to satisfy the stern end-to-end requirements of QoS-based communication networks. In this paper we modifies existing fully distributed cluster-based routing algorithm by addressing local recovery for the link failure. Performance of this new fault-tolerant fully distributed cluster-based routing algorithm is evaluated by simulating it in NS2 environment and we show that it performs better than the existing algorithm and provide better solution for fault detection and fault management along the QoS paths
The MobyDick Project: A Mobile Heterogeneous All-IP Architecture
Proceedings of Advanced Technologies, Applications and Market Strategies for 3G (ATAMS 2001). Cracow, Poland: 17-20 June, 2001.This paper presents the current stage of an IP-based architecture for heterogeneous environments, covering UMTS-like W-CDMA wireless access technology, wireless and wired LANs, that is being developed under the aegis of the IST Moby Dick project. This architecture treats all transmission capabilities as basic physical and data-link layers, and attempts to replace all higher-level tasks by IP-based strategies.
The proposed architecture incorporates aspects of mobile-IPv6, fast handover, AAA-control, and Quality of Service. The architecture allows for an optimised control on the radio link layer resources. The Moby dick architecture is currently under refinement for implementation on field trials. The services planned for trials are data transfer and voice-over-IP.Publicad
Recommended from our members
Internet security for mobile computing
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end userâs data is susceptible to malicious attacks. For instance, when paying a bill at a store with NFC mobile payment, navigating through a city operating GPS on a smartphone, or dictating the temperature at a household with a home automation device. These activities seem routine, yet, when vulnerabilities are present they can leave holes for hackers to access bank accounts, pinpoint a userâs recent location, or tell when someone is not at home. The awareness of the end user cannot be trusted. Device vendors and developers must provide safeguards.
An ongoing issue is that the present security standards are outdated and were never envisioned with mobile devices in mind. It can be suggested that security is only idling the progress of mobile computing. Still, many application developers and IT professionals do not adopt security standards fast enough to keep up-to-date with known vulnerabilities.
The main goals of the next generation of security standards, TLS, will provide developers with greater security efficiency and improved mobile throughput. These proposed capabilities of the TLS protocol will streamline mobile computing into the forefront of security practices. The analysis of this report demonstrates concepts on the direction mobile security, usability, and performance from a development standpoint.Electrical and Computer Engineerin
- âŠ