4,273 research outputs found

    VECTORS: Video communication through opportunistic relays and scalable video coding

    Full text link
    Crowd-sourced video distribution is frequently of interest in the local vicinity. In this paper, we propose a novel design to transfer such content over opportunistic networks with adaptive quality encoding to achieve reasonable delay bounds. The video segments are transmitted between source and destination in a delay tolerant manner using the Nearby Connections Android library. This implementation can be applied to multiple domains, including farm monitoring, wildlife, and environmental tracking, disaster response scenarios, etc. In this work, we present the design of an opportunistic contact based system, and we discuss basic results for the trial runs within our institute.Comment: 13 pages, 6 figures, and under 3000 words for submission to the SoftwareX journa

    Game-theoretical design of an adaptive distributed dissemination protocol for VANETs

    Get PDF
    Road safety applications envisaged for Vehicular Ad Hoc Networks (VANETs) depend largely on the dissemination of warning messages to deliver information to concerned vehicles. The intended applications, as well as some inherent VANET characteristics, make data dissemination an essential service and a challenging task in this kind of networks. This work lays out a decentralized stochastic solution for the data dissemination problem through two game-theoretical mechanisms. Given the non-stationarity induced by a highly dynamic topology, diverse network densities, and intermittent connectivity, a solution for the formulated game requires an adaptive procedure able to exploit the environment changes. Extensive simulations reveal that our proposal excels in terms of number of transmissions, lower end-to-end delay and reduced overhead while maintaining high delivery ratio, compared to other proposalsPeer ReviewedPostprint (published version

    Opportunistic Networks: Present Scenario- A Mirror Review

    Get PDF
    Opportunistic Network is form of Delay Tolerant Network (DTN) and regarded as extension to Mobile Ad Hoc Network. OPPNETS are designed to operate especially in those environments which are surrounded by various issues like- High Error Rate, Intermittent Connectivity, High Delay and no defined route between source to destination node. OPPNETS works on the principle of “Store-and-Forward” mechanism as intermediate nodes perform the task of routing from node to node. The intermediate nodes store the messages in their memory until the suitable node is not located in communication range to transfer the message to the destination. OPPNETs suffer from various issues like High Delay, Energy Efficiency of Nodes, Security, High Error Rate and High Latency. The aim of this research paper is to overview various routing protocols available till date for OPPNETs and classify the protocols in terms of their performance. The paper also gives quick review of various Mobility Models and Simulation tools available for OPPNETs simulation

    A mobile agent and message ferry mechanism based routing for delay tolerant network

    Get PDF
    Delay Tolerant Network (DTN) is a class of networks characterized by long delays, frequent disconnections and partitioning of communication paths between network nodes. Due to the frequent disconnection and network partitioning, the overall performance of the network will be deteriorated sharply. The problem is how to make the network fairly connected to optimize data routing and enhance the performance of a network. The aim of this study is to improve the performance of DTN by minimizing end-to-end delivery time and increasing message delivery ratio. Therefore, this research tackles the problem of intermittent connectivity and network partitioning by introducing Agents and Ferry Mechanism based Routing (AFMR). The AFMR comprises of two stages by applying two schemes: mobile agents and ferry mechanism. The agents' scheme is proposed to deal with intermittent connectivity and network partitioning by collecting the basic information about network connection such as signal strength, nodes position in the network and distance to the destination nodes to minimize end-to-end delivery time. The second stage is to increase the message delivery ratio by moving the nodes towards the path with available network connectivity based on agents' feedback. The AFMR is evaluated through simulations and the results are compared with those of Epidemic, PRoPHET and Message Ferry (MF). The findings demonstrate that AFMR is superior to all three, with respect to the average end-to-end delivery time, message delivery ratio, network load and message drop ratio, which are regarded as extremely important metrics for the evaluation of DTN routing protocols. The AFMR achieves improved network performance in terms of end-to-end delivery time (56.3%); enhanced message delivery ratio (60.0%); mitigation of message drop (63.5%) and reduced network load (26.1 %). The contributions of this thesis are to enhance the performance of DTN by significantly overcoming the intermittent connectivity and network partitioning problems in the network

    SECURE AND EFFICIENT INFORMATION MANAGEMENT IN DELAY(DISRUPTION) TOLERANT NETWORK

    Get PDF
    In environments like international military coalitions on the battlefield or multi-party relief work in a disaster zone, multiple teams are deployed to serve different mission goals by the command-and-control center (CC). They may need to survey damages and send information to the CC for situational awareness and also transfer messages to each other for mission purposes. However, due to the damaged network infrastructure in the emergency, nodes need to relay messages using the store and forward paradigm, also called Delay-tolerant Networks (DTNs). In DTN, the limited bandwidth, energy, and contacts among the nodes, and their interdependency impose several challenges such as sensitive data leakage to malicious nodes, redundant data generation, limited and delayed important message delivery, non-interested messages in storage, etc. We aim to focus on solving these challenges. We propose message fragmentation for secure message transfer because existing public-private-key cryptographic approaches may not work due to the unavailability of Public Key Infrastructure (PKI). Besides, to ensure more message delivery, redundant fragments are generated. However, too much redundancy may consume the energy and bandwidth of the nodes while transferring similar messages. Hence, we propose to send diverse content and limit the redundancy. Again, the dynamic environment we consider is prone to many adverse and sudden events. We aim to respond to these events by sending the event-related message to the CC fast with the help of intermediate nodes. The nodes are interested in certain types of content defined by their mission and interest. Therefore, we target to learn nodes\u27 interests using Reinforcement Learning so that the nodes can populate themselves with the messages according to their mission requirements and increase the collaboration among them. Our future work will include machine learning techniques for predicting important places where node encounters the most and to cache data for each other according to their interest, encounter frequency, and encounter locations --Abstract, p. i
    corecore