559 research outputs found

    Exploiting the power of multiplicity: a holistic survey of network-layer multipath

    Get PDF
    The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive assumption of a single working path between a source and a destination. The lack of native multipath support constrains network performance even as the underlying network is richly connected and has redundant multiple paths. Computer networks can exploit the power of multiplicity, through which a diverse collection of paths is resource pooled as a single resource, to unlock the inherent redundancy of the Internet. This opens up a new vista of opportunities, promising increased throughput (through concurrent usage of multiple paths) and increased reliability and fault tolerance (through the use of multiple paths in backup/redundant arrangements). There are many emerging trends in networking that signify that the Internet's future will be multipath, including the use of multipath technology in data center computing; the ready availability of multiple heterogeneous radio interfaces in wireless (such as Wi-Fi and cellular) in wireless devices; ubiquity of mobile devices that are multihomed with heterogeneous access networks; and the development and standardization of multipath transport protocols such as multipath TCP. The aim of this paper is to provide a comprehensive survey of the literature on network-layer multipath solutions. We will present a detailed investigation of two important design issues, namely, the control plane problem of how to compute and select the routes and the data plane problem of how to split the flow on the computed paths. The main contribution of this paper is a systematic articulation of the main design issues in network-layer multipath routing along with a broad-ranging survey of the vast literature on network-layer multipathing. We also highlight open issues and identify directions for future work

    Anomaly detection in unknown environments using wireless sensor networks

    Get PDF
    This dissertation addresses the problem of distributed anomaly detection in Wireless Sensor Networks (WSN). A challenge of designing such systems is that the sensor nodes are battery powered, often have different capabilities and generally operate in dynamic environments. Programming such sensor nodes at a large scale can be a tedious job if the system is not carefully designed. Data modeling in distributed systems is important for determining the normal operation mode of the system. Being able to model the expected sensor signatures for typical operations greatly simplifies the human designer’s job by enabling the system to autonomously characterize the expected sensor data streams. This, in turn, allows the system to perform autonomous anomaly detection to recognize when unexpected sensor signals are detected. This type of distributed sensor modeling can be used in a wide variety of sensor networks, such as detecting the presence of intruders, detecting sensor failures, and so forth. The advantage of this approach is that the human designer does not have to characterize the anomalous signatures in advance. The contributions of this approach include: (1) providing a way for a WSN to autonomously model sensor data with no prior knowledge of the environment; (2) enabling a distributed system to detect anomalies in both sensor signals and temporal events online; (3) providing a way to automatically extract semantic labels from temporal sequences; (4) providing a way for WSNs to save communication power by transmitting compressed temporal sequences; (5) enabling the system to detect time-related anomalies without prior knowledge of abnormal events; and, (6) providing a novel missing data estimation method that utilizes temporal and spatial information to replace missing values. The algorithms have been designed, developed, evaluated, and validated experimentally in synthesized data, and in real-world sensor network applications

    Spatial correlation based low energy aware clustering (LEACH) in a wireless sensor networks

    Get PDF
    In this paper, an enhanced Low Energy Aware Cluster Head (LEACH) protocol is proposed. It applies aggregation strategies in the area monitored by sensor nodes to reduce the number of reports sent to sink and to save energy. The basic idea is to weight the information sensed by sensors based on the distortion area in order to estimate better the event at the sink node. This approach seeks to exploit the spatial correlation among nodes and among clusters to assign different importance to the information aggregated and forwarded by the cluster head nodes. A multi-zone monitoring related to clusters is proposed, and a dynamic weights management is presented to consider distortion at cluster level introduced in the event estimation. A mathematical formulation of the problem and the proposal to weight space and data information is led out. Simulation campaigns in Matlab show the effectiveness of the event estimation in terms of event estimation distortion and network lifetime

    Application of Smart Antenna Technologies in Simultaneous Wireless Information and Power Transfer

    Full text link
    Simultaneous wireless information and power transfer (SWIPT) is a promising solution to increase the lifetime of wireless nodes and hence alleviate the energy bottleneck of energy constrained wireless networks. As an alternative to conventional energy harvesting techniques, SWIPT relies on the use of radio frequency signals, and is expected to bring some fundamental changes to the design of wireless communication networks. This article focuses on the application of advanced smart antenna technologies, including multiple-input multiple-output and relaying techniques, to SWIPT. These smart antenna technologies have the potential to significantly improve the energy efficiency and also the spectral efficiency of SWIPT. Different network topologies with single and multiple users are investigated, along with some promising solutions to achieve a favorable trade-off between system performance and complexity. A detailed discussion of future research challenges for the design of SWIPT systems is also provided

    Machine Learning across the WSN Layers

    Get PDF

    Review on Swarm Intelligence Optimization Techniques for Obstacle-Avoidance Localization in Wireless Sensor Networks

    Get PDF
    Wireless sensor network (WSN) is an evolving research topic with potential applications. In WSN, the nodes are spatially distributed and determining the path of transmission high challenging. Localization eases the path determining process between source and destination. The article, describes the localization techniques based on wireless sensor networks. Sensor network has been made viable by the convergence of Micro Electro- Mechanical Systems technology. The mobile anchor is used for optimizing the path planning location-aware mobile node. Two optimization algorithms have been used for reviewing the performacne. They are Grey Wolf Optimizer(GWO) and Whale Optimization Algorithm(WOA). The results show that WOA outperforms in maximizing the localization accuracy

    Review on Swarm Intelligence Optimization Techniques for Obstacle-Avoidance Localization in Wireless Sensor Networks

    Get PDF
    Wireless sensor network (WSN) is an evolving research topic with potential applications. In WSN, the nodes are spatially distributed and determining the path of transmission high challenging. Localization eases the path determining process between source and destination. The article, describes the localization techniques based on wireless sensor networks. Sensor network has been made viable by the convergence of Micro Electro- Mechanical Systems technology. The mobile anchor is used for optimizing the path planning location-aware mobile node. Two optimization algorithms have been used for reviewing the performacne. They are Grey Wolf Optimizer(GWO) and Whale Optimization Algorithm(WOA). The results show that WOA outperforms in maximizing the localization accuracy
    corecore