633 research outputs found

    Wetland Functions

    Get PDF
    This resource explains a number of critical functions performed by wetlands. Students will discover that wetlands moderate impacts from flooding, control erosion, purify water, and provide habitat for fish and wildlife. They also provide a unique natural environment for people to enjoy outdoor recreation activities. It is part of a module that aims to help students get to know the complexities of wetlands, discover wildlife, enjoy the experience of being outdoors, and learn how necessary wetlands are to the health of our environment. Although it is about wetlands in New England for educators and their middle school students, it suggests ways to study wetland characteristics, why wetlands are important, and how students and teachers can help protect a local wetland in any part of the country. An associated set of activities is also available. Educational levels: Middle school

    Energy Efficient Location Aided Routing Protocol for Wireless MANETs

    Get PDF
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. In this paper we introduce an Energy Efficient Location Aided Routing (EELAR) Protocol for MANETs that is based on the Location Aided Routing (LAR). EELAR makes significant reduction in the energy consumption of the mobile nodes batteries by limiting the area of discovering a new route to a smaller zone. Thus, control packets overhead is significantly reduced. In EELAR a reference wireless base station is used and the network's circular area centered at the base station is divided into six equal sub-areas. At route discovery instead of flooding control packets to the whole network area, they are flooded to only the sub-area of the destination mobile node. The base station stores locations of the mobile nodes in a position table. To show the efficiency of the proposed protocol we present simulations using NS-2. Simulation results show that EELAR protocol makes an improvement in control packet overhead and delivery ratio compared to AODV, LAR, and DSR protocols.Comment: 9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis

    Flooding control in route discovery for reactive routing in mobile ad hoc networks

    Get PDF
    Routing is a very important function in the network layer of the OSI model for wired and wireless networks. Mobile Ad hoc Networks (MANETs) are a collection of wireless nodes forming a temporary network that is supposed to be constructed on the fly without infrastructure and prior setup. This fashion of setup demands that the nodes act as routers for other nodes. This necessitates the need of a robust dynamic routing scheme. Routing protocols are classified into three main categories: proactive, reactive, and hybrid. Reactive routing has been the focus of research in recent years due to its control traffic overhead reduction. Reactive routing operation involves three main steps: route discovery, packet delivery, and route maintenance. If a source node, initiating the message, knows the route to the destination, this route is used to transmit the message; otherwise, the source node will initiate a route discovery algorithm to build the route, which highlights the importance of this phase of the on-demand routing process. This thesis work will present a route discovery algorithm that will try to find the route between the sender and the intended receiver in relatively short periods of end-to-end delay, least amount of control traffic overhead, and a loop free path between the two communicating parties. Furthermore, performance comparison between the proposed algorithm and other standard algorithms, namely basic flooding and flooding with self-pruning, will be conducted. The proposed route discovery algorithm can be used in several approaches serving ad hoc network setup, where connectivity establishment and maintenance is important

    Route duration improvement in wireless sensor and actuator networks based on mobility parameters and flooding control

    Get PDF
    Mobility of nodes is one of the main causes of broken links in wireless networks. Although several theoretical models for links and routes selection have been proposed in the literature, so far little effort has been made to apply them to the existing routing protocols. In this article, a decision tree has been incorporated in a reactive routing protocol in order to select the most long-lived routes. The decision tree is based on nodes ’ mobility parameters typically considered by the theoretical models, such as distance between nodes, relative speed, and nodes ’ directions. The flooding techniques used within the routing protocols for the routing discovery procedures cause a massive usage of control packets which in turn has negative impact on the performance of the networks. So, an improved flooding control is presented in this article that enhances the performance of the proposed route selection based on a decision tree, in turn reducing overheads and the power consumption caused by the control packets. These two proposed approaches have been implemented over a widely used reactive routing protocol such as Ad Hoc On-Demand Distance Vector (AODV) to obtain performance results using Network Simulator 2 simulation tool. The performances of the proposed approaches have been compared with that of the AODV implementation in terms of general performance and path duration. The simulation results show that the proposed route selection significantly improves the results of AOD

    Protect, Adapt or Relocate? Responding to Climate Change in Coastal Indonesia

    Get PDF
    On the coast of Java, Semarang City faces a multitude of climate-related problems including sea-level rise, flash and tidal floods, subsidence and coastal erosion. Using four case-study villages, this working paper explores how households are coping with the impacts of climate change. How do they decide whether to protect, adapt or relocate their property to areas less affected, and what are the costs? Understanding household risk assessments and decision-making processes should effectively tailor government policies to reduce vulnerability and support local adaptation strategies. By bringing together all stakeholders, an urban climate governance approach should ensure a more resilient city

    Consumption soothing and vulnerability in the Zone Lacustre, Mali

    Get PDF
    "This paper explores risk sharing in the Zone Lacustre, Mali, as viewed through the lens of consumption smoothing. We find that idiosyncratic shocks appear to have little impact on consumption, and that households respond to these shocks in a variety of ways. In general, nonpoor households are more likely to enter into new income-generating activities while poor households are more likely to engage in credit or gift exchange or to ration consumption. When we construct a stronger test for consumption smoothing, we find that changes in household income lead to modest changes in consumption. Covariant shocks, as measured by village/round dummies, always lead to changes in consumption. These results are robust to concerns regarding bias resulting from measurement error or endogeneity of changes in income. Lastly, we find that households with access to improved water control infrastructure are less vulnerable than those that rely on rainfall or the flooding of the Niger River." Authors' AbstractVulnerability ,Consumption shocks ,

    Towards Opportunistic Data Dissemination in Mobile Phone Sensor Networks

    Get PDF
    Recently, there has been a growing interest within the research community in developing opportunistic routing protocols. Many schemes have been proposed; however, they differ greatly in assumptions and in type of network for which they are evaluated. As a result, researchers have an ambiguous understanding of how these schemes compare against each other in their specific applications. To investigate the performance of existing opportunistic routing algorithms in realistic scenarios, we propose a heterogeneous architecture including fixed infrastructure, mobile infrastructure, and mobile nodes. The proposed architecture focuses on how to utilize the available, low cost short-range radios of mobile phones for data gathering and dissemination. We also propose a new realistic mobility model and metrics. Existing opportunistic routing protocols are simulated and evaluated with the proposed heterogeneous architecture, mobility models, and transmission interfaces. Results show that some protocols suffer long time-to-live (TTL), while others suffer short TTL. We show that heterogeneous sensor network architectures need heterogeneous routing algorithms, such as a combination of Epidemic and Spray and Wait
    corecore