6,221 research outputs found
A Trust Based Fuzzy Algorithm for Congestion Control in Wireless Multimedia Sensor Networks (TFCC)
Network congestion has become a critical issue for resource constrained
Wireless Sensor Networks (WSNs), especially for Wireless Multimedia Sensor
Networks (WMSNs)where large volume of multimedia data is transmitted through
the network. If the traffic load is greater than the available capacity of the
sensor network, congestion occurs and it causes buffer overflow, packet drop,
deterioration of network throughput and quality of service (QoS). Again, the
faulty nodes of the network also aggravate congestion by diffusing useless
packets or retransmitting the same packet several times. This results in the
wastage of energy and decrease in network lifetime. To address this challenge,
a new congestion control algorithm is proposed in which the faulty nodes are
identified and blocked from data communication by using the concept of trust.
The trust metric of all the nodes in the WMSN is derived by using a two-stage
Fuzzy inferencing scheme. The traffic flow from source to sink is optimized by
implementing the Link State Routing Protocol. The congestion of the sensor
nodes is controlled by regulating the rate of traffic flow on the basis of the
priority of the traffic. Finally we compare our protocol with other existing
congestion control protocols to show the merit of the work.Comment: 6 pages, 5 figures, conference pape
Facilitating the creation of IoT applications through conditional observations in CoAP
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things. The biggest challenge faced is the resource constraint of the smart objects to directly utilize the existing standard protocols and applications. A number of initiatives are currently witnessed to resolve this situation. One of such initiatives is the introduction of Constrained Application Protocol. This protocol is developed to fit in the resource-constrained smart object with the ability to easily translate to the prominent representational state transfer implementation, hypertext transfer protocol (and vice versa). The protocol has several optional extensions, one of them being, resource observation. With resource observation, a client may ask a server to be notified every state change of the resource. However, in many applications, all state changes are not significant enough for the clients. Therefore, the client will have to decide whether to use a value sent by a server or not. This results in wastage of the already constrained resources (bandwidth, processing power,aEuro broken vertical bar). In this paper, we introduced an alternative to the normal resource observation function, named Conditional Observation, where clients tell the servers the criteria for notification. We evaluated the power consumption and number of packets transmitted between clients and servers by using different network sizes and number of servers. In all cases, we found out that the existing observe option results in excessive number of packets (most of them unimportant for the client) and higher power consumption. We also made an extensive theoretical evaluation of the two approaches which give consistent result with the results we got from experimentation
Distributed Optimal Rate-Reliability-Lifetime Tradeoff in Wireless Sensor Networks
The transmission rate, delivery reliability and network lifetime are three
fundamental but conflicting design objectives in energy-constrained wireless
sensor networks. In this paper, we address the optimal
rate-reliability-lifetime tradeoff with link capacity constraint, reliability
constraint and energy constraint. By introducing the weight parameters, we
combine the objectives at rate, reliability, and lifetime into a single
objective to characterize the tradeoff among them. However, the optimization
formulation of the rate-reliability-reliability tradeoff is neither separable
nor convex. Through a series of transformations, a separable and convex problem
is derived, and an efficient distributed Subgradient Dual Decomposition
algorithm (SDD) is proposed. Numerical examples confirm its convergence. Also,
numerical examples investigate the impact of weight parameters on the rate
utility, reliability utility and network lifetime, which provide a guidance to
properly set the value of weight parameters for a desired performance of WSNs
according to the realistic application's requirements.Comment: 27 pages, 10 figure
Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario
RPL, the routing protocol proposed by IETF for IPv6/6LoWPAN Low Power and
Lossy Networks has significant complexity. Another protocol called LOADng, a
lightweight variant of AODV, emerges as an alternative solution. In this paper,
we compare the performance of the two protocols in a Home Automation scenario
with heterogenous traffic patterns including a mix of multipoint-to-point and
point-to-multipoint routes in realistic dense non-uniform network topologies.
We use Contiki OS and Cooja simulator to evaluate the behavior of the
ContikiRPL implementation and a basic non-optimized implementation of LOADng.
Unlike previous studies, our results show that RPL provides shorter delays,
less control overhead, and requires less memory than LOADng. Nevertheless,
enhancing LOADng with more efficient flooding and a better route storage
algorithm may improve its performance
Reliable Energy-Efficient Routing Algorithm for Vehicle-Assisted Wireless Ad-Hoc Networks
We investigate the design of the optimal routing path in a moving vehicles
involved the internet of things (IoT). In our model, jammers exist that may
interfere with the information exchange between wireless nodes, leading to
worsened quality of service (QoS) in communications. In addition, the transmit
power of each battery-equipped node is constrained to save energy. We propose a
three-step optimal routing path algorithm for reliable and energy-efficient
communications. Moreover, results show that with the assistance of moving
vehicles, the total energy consumed can be reduced to a large extend. We also
study the impact on the optimal routing path design and energy consumption
which is caused by path loss, maximum transmit power constrain, QoS
requirement, etc.Comment: 6 pages, 5 figures, rejected by IEEE Globecom 2017,resubmit to IEEE
WCNC 201
Cross-layer design of multi-hop wireless networks
MULTI -hop wireless networks are usually defined as a collection of nodes
equipped with radio transmitters, which not only have the capability to
communicate each other in a multi-hop fashion, but also to route each others’ data
packets. The distributed nature of such networks makes them suitable for a variety of
applications where there are no assumed reliable central entities, or controllers, and
may significantly improve the scalability issues of conventional single-hop wireless
networks.
This Ph.D. dissertation mainly investigates two aspects of the research issues
related to the efficient multi-hop wireless networks design, namely: (a) network
protocols and (b) network management, both in cross-layer design paradigms to
ensure the notion of service quality, such as quality of service (QoS) in wireless mesh
networks (WMNs) for backhaul applications and quality of information (QoI) in
wireless sensor networks (WSNs) for sensing tasks. Throughout the presentation of
this Ph.D. dissertation, different network settings are used as illustrative examples,
however the proposed algorithms, methodologies, protocols, and models are not
restricted in the considered networks, but rather have wide applicability.
First, this dissertation proposes a cross-layer design framework integrating
a distributed proportional-fair scheduler and a QoS routing algorithm, while using
WMNs as an illustrative example. The proposed approach has significant performance
gain compared with other network protocols. Second, this dissertation proposes
a generic admission control methodology for any packet network, wired and
wireless, by modeling the network as a black box, and using a generic mathematical
0. Abstract 3
function and Taylor expansion to capture the admission impact. Third, this dissertation
further enhances the previous designs by proposing a negotiation process,
to bridge the applications’ service quality demands and the resource management,
while using WSNs as an illustrative example. This approach allows the negotiation
among different service classes and WSN resource allocations to reach the optimal
operational status. Finally, the guarantees of the service quality are extended to
the environment of multiple, disconnected, mobile subnetworks, where the question
of how to maintain communications using dynamically controlled, unmanned data
ferries is investigated
- …