37,223 research outputs found
Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles
Vehicular Ad-hoc Networks (VANET) enable efficient communication between
vehicles with the aim of improving road safety. However, the growing number of
vehicles in dense regions and obstacle shadowing regions like Manhattan and
other downtown areas leads to frequent disconnection problems resulting in
disrupted radio wave propagation between vehicles. To address this issue and to
transmit critical messages between vehicles and drones deployed from service
vehicles to overcome road incidents and obstacles, we proposed a hybrid
technique based on fog computing called Hybrid-Vehfog to disseminate messages
in obstacle shadowing regions, and multi-hop technique to disseminate messages
in non-obstacle shadowing regions. Our proposed algorithm dynamically adapts to
changes in an environment and benefits in efficiency with robust drone
deployment capability as needed. Performance of Hybrid-Vehfog is carried out in
Network Simulator (NS-2) and Simulation of Urban Mobility (SUMO) simulators.
The results showed that Hybrid-Vehfog outperformed Cloud-assisted Message
Downlink Dissemination Scheme (CMDS), Cross-Layer Broadcast Protocol (CLBP),
PEer-to-Peer protocol for Allocated REsource (PrEPARE), Fog-Named Data
Networking (NDN) with mobility, and flooding schemes at all vehicle densities
and simulation times
Wireless cache invalidation schemes with link adaptation and downlink traffic
Providing on-demand data access in client-server wireless networks is an important support to many interesting mobile computing applications. Caching frequently accessed data by mobile clients can conserve wireless bandwidth and battery power, at the expense of some system resources to maintain cache consistency. The basic cache consistency strategy is the use of periodic invalidation reports (IRs) broadcast by the server. Recently, IR-based approaches have been further improved by using additional updated invalidation reports (UIRs) (i.e., the IR+UIR algorithm) to reduce the long query latency. However, the performance of the IR+UIR approach in a practical system is still largely unknown. Specifically, previous results are based on two impractical simplifying assumptions: 1 ) broadcast traffic is error-free and 2) no other downlink traffic (e.g., voice) exists in the system. The first assumption is clearly unrealistic as signal propagation impairments (e.g., multipath fading) and, hence, packet reception failures are inevitable in a practical situation. The second assumption is also inapplicable in real life because mobile devices are usually multipurposed (e.g., a mobile phone equipped with a browser may be used for Web surfing while having a phone conversation). In this paper, we first study the performance of the IR+UIR approach under a realistic system model: The quality of the wireless channel is time-varying, and there are other downlink traffics in the system. Our simulation results show that query delay significantly increases as a result of broadcast error and the additional downlink traffics experience longer delay due to extended broadcast period. Exploiting link adaptation (i.e., transmission rate is adjusted dynamically according to channel quality), we then propose three schemes to tackle these two problems. Our results indicate that the proposed schemes outperform IR+UIR under a wide range of system parameters.published_or_final_versio
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Pinwheel Scheduling for Fault-tolerant Broadcast Disks in Real-time Database Systems
The design of programs for broadcast disks which incorporate real-time and fault-tolerance requirements is considered. A generalized model for real-time fault-tolerant broadcast disks is defined. It is shown that designing programs for broadcast disks specified in this model is closely related to the scheduling of pinwheel task systems. Some new results in pinwheel scheduling theory are derived, which facilitate the efficient generation of real-time fault-tolerant broadcast disk programs.National Science Foundation (CCR-9308344, CCR-9596282
Performance evaluation of an efficient counter-based scheme for mobile ad hoc networks based on realistic mobility model
Flooding is the simplest and commonly used mechanism for broadcasting in mobile ad hoc networks (MANETs). Despite its simplicity, it can result in high redundant retransmission, contention and collision in the network, a phenomenon referred to as broadcast storm problem. Several probabilistic broadcast schemes have been proposed to mitigate this problem inherent with flooding. Recently, we have proposed a hybrid-based scheme as one of the probabilistic scheme, which combines the advantages of pure probabilistic and counter-based schemes to yield a significant performance improvement. Despite these considerable numbers of proposed broadcast schemes, majority of these schemes’ performance evaluation was based on random waypoint model. In this paper, we evaluate the performance of our broadcast scheme using a community based mobility model which is based on social network theory and compare it against widely used random waypoint mobility model. Simulation results have shown that using unrealistic movement pattern does not truly reflect on the actual performance of the scheme in terms of saved-rebroadcast, reachability and end to end delay
Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain
Blockchain, an emerging decentralized security system, has been applied in
many applications, such as bitcoin, smart grid, and Internet-of-Things.
However, running the mining process may cost too much energy consumption and
computing resource usage on handheld devices, which restricts the use of
blockchain in mobile environments. In this paper, we consider deploying edge
computing service to support the mobile blockchain. We propose an auction-based
edge computing resource market of the edge computing service provider. Since
there is competition among miners, the allocative externalities (positive and
negative) are taken into account in the model. In our auction mechanism, we
maximize the social welfare while guaranteeing the truthfulness, individual
rationality and computational efficiency. Based on blockchain mining experiment
results, we define a hash power function that characterizes the probability of
successfully mining a block. Through extensive simulations, we evaluate the
performance of our auction mechanism which shows that our edge computing
resources market model can efficiently solve the social welfare maximization
problem for the edge computing service provider
Time-Varying Graphs and Dynamic Networks
The past few years have seen intensive research efforts carried out in some
apparently unrelated areas of dynamic systems -- delay-tolerant networks,
opportunistic-mobility networks, social networks -- obtaining closely related
insights. Indeed, the concepts discovered in these investigations can be viewed
as parts of the same conceptual universe; and the formal models proposed so far
to express some specific concepts are components of a larger formal description
of this universe. The main contribution of this paper is to integrate the vast
collection of concepts, formalisms, and results found in the literature into a
unified framework, which we call TVG (for time-varying graphs). Using this
framework, it is possible to express directly in the same formalism not only
the concepts common to all those different areas, but also those specific to
each. Based on this definitional work, employing both existing results and
original observations, we present a hierarchical classification of TVGs; each
class corresponds to a significant property examined in the distributed
computing literature. We then examine how TVGs can be used to study the
evolution of network properties, and propose different techniques, depending on
whether the indicators for these properties are a-temporal (as in the majority
of existing studies) or temporal. Finally, we briefly discuss the introduction
of randomness in TVGs.Comment: A short version appeared in ADHOC-NOW'11. This version is to be
published in Internation Journal of Parallel, Emergent and Distributed
System
- …