78,674 research outputs found

    Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications

    Get PDF
    In military applications mobile adhoc network plays very important role because it is specifically designed network for on demand requirement and in situations where set up of physical network is not possible. This special type of network which takes control in infrastructure less communication handles serious challenges tactfully such as highly robust and dynamic military work stations, devices and smaller sub-networks in the battle field. Therefore there is a high demand of designing efficient routing protocols ensuring security and reliability for successful transmission of highly sensitive and confidential military information in defence networks. With this objective, a power efficient network layer routing protocol in the network for military application is designed and simulated using a new cross layer approach of design to increase reliability and network lifetime up to a greater extent.

    Literature Survey of Security Enhancement in MANET Routing Protocols of WLANs

    Full text link
    A Mobile Ad-hoc Network (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. One of the main issues in such networks is performance- in a dynamically changing topology; the nodes are expected to be power-aware due to the bandwidth constrained network. Another issue in such networks is security - since every node participates in the operation of the network equally, Malicious nodes are difficult to detect. There are several applications of mobile ad hoc networks such as disaster recovery operations, battle field communications, etc. The most active research area under MANET routing protocol is security. MANETs have certain unique characteristics that make them vulnerable to several types of attacks. Since they are deployed an open environment where all nodes co-operate in forwarding the packets in the network, Malicious nodes are difficult to detect

    A Novel Routing Protocol For Wireless Sensor Networks With Improved Energy Efficient LEACH

    Get PDF
    Wireless Sensor Networks (Wsns) Have Been Widely Considered As One Of The Most Important Technologies For The Twenty-First Century. A Typical Wireless Sensor Network(WSN) Used For Environmental Condition Monitoring, Security Surveillance Of Battle-Fields, Wildlife Habitat Monitoring, Etc. Cluster-Based Hierarchical Routing Protocols Play An Essential Role In Decreasing The Energy Consumption Of Wireless Sensor Networks (Wsns). A Low-Energy Adaptive Clustering Hierarchy (LEACH) Has Been Proposed As An Application-Specific Protocol Architecture For Wsns. However, Without Considering The Distribution Of The Cluster Heads (Chs) In The Rotation Basis, The LEACH Protocol Will Increase The Energy Consumption Of The Network. To Improve The Energy Efficiency Of The WSN, We Propose A Novel Modified Routing Protocol In This Paper. The Newly Proposed Improved Energy-Efficient LEACH (IEE-LEACH) Protocol Considers The Residual Node Energy And The Average Energy Of The Networks. To Achieve Satisfactory Performance In Terms Of Reducing The Sensor Energy Consumption, The Proposed IEE-LEACH Accounts For The Numbers Of The Optimal Chs And Prohibits The Nodes That Are Closer To The Base Station (BS) To Join In The Cluster Formation. Furthermore, The Proposed IEE-LEACH Uses A New Threshold For Electing Chs Among The Sensor Nodes, And Employs Single Hop, Multi-Hop, And Hybrid Communications To Further Improve The Energy Efficiency Of The Networks. The Simulation Results Demonstrate That, Compared With Some Existing Routing Protocols, The Proposed Protocol Substantially Reduces The Energy Consumption Of Wsns

    Enabling reliable and power efficient real-time multimedia delivery over wireless sensor networks

    Get PDF
    There is an increasing need to run real-time multimedia applications, e.g. battle field and border surveillance, over Wireless Sensor Networks (WSNs). In WSNs, packet delivery exhibits high packet loss rate due to congestion, wireless channel high bit error rate, route failure, signal attenuation, etc... Flooding conventional packets over all sensors redundantly provides reliable delivery. However, flooding real-time multimedia packets is energy inefficient for power limited sensors and causes severe contentions affecting reliable delivery. We propose the Flooding Zone Initialization Protocol (FZIP) to enhance reliability and reduce power consumption of real-time multimedia flooding in WSNs. FZIP is a setup protocol which constrains flooding within a small subset of intermediate nodes called Flooding Zone (FZ). Also, we propose the Flooding Zone Control Protocol (FZCP) which monitors the session quality and dynamically changes the FZ size to adapt to current network state, thus providing a tradeoff of good quality and less power consumption

    The battle between standards: TCP/IP vs OSI victory through path dependency or by quality?

    Get PDF
    Between the end of the 1970s and 1994 a fierce competition existed between two possible standards, TCP/IP and OSI, to solve the problem of interoperability of computer networks. Around 1994 it became evident that TCP/IP and not OSI had become the dominant standard. We specifically deal with the question whether the current dominance of the TCP/IP standard is the result of third degree path dependency or of choices based on assessments of it being technical-economically superior to the OSI standard and protocols

    A Reusable Component for Communication and Data Synchronization in Mobile Distributed Interactive Applications

    Full text link
    In Distributed Interactive Applications (DIA) such as multiplayer games, where many participants are involved in a same game session and communicate through a network, they may have an inconsistent view of the virtual world because of the communication delays across the network. This issue becomes even more challenging when communicating through a cellular network while executing the DIA client on a mobile terminal. Consistency maintenance algorithms may be used to obtain a uniform view of the virtual world. These algorithms are very complex and hard to program and therefore, the implementation and the future evolution of the application logic code become difficult. To solve this problem, we propose an approach where the consistency concerns are handled separately by a distributed component called a Synchronization Medium, which is responsible for the communication management as well as the consistency maintenance. We present the detailed architecture of the Synchronization Medium and the generic interfaces it offers to DIAs. We evaluate our approach both qualitatively and quantitatively. We first demonstrate that the Synchronization Medium is a reusable component through the development of two game applications, a car racing game and a space war game. A performance evaluation then shows that the overhead introduced by the Synchronization Medium remains acceptable.Comment: In Proceedings WCSI 2010, arXiv:1010.233

    Training and education for network centric warfare : issues for New Zealand's Defence Force : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in Defence and Strategic Studies at Massey University

    Get PDF
    The concept of Network centric warfare (NCW) is viewed as the next revolution in military affairs. Its introduction globally will necessarily affect the way the New Zealand Armed Forces operates in future conflicts. With the increasing use of digital technology in the military environment the need for and degree of increasing knowledge of Network Centric Warfare and its concepts must be explored.This country will have to combine its own definition and understanding of NCW into the framework of its Armed Force if it wants to continue to remain interoperable with technologically advanced coalition forces. This thesis looks into the issues and solutions which have been considered by other countries in their attempts to implement the NCW concept. It examines in detail how issues and solutions could be applied to New Zealand's attempt at NCW. Chapters One and Two define the academic processes which have been used in this study. They also give a brief introduction to the broad idea of Network Centric Warfare and its origins. Chapter Three examines in detail the complex evolution of the concept of Network Centric Warfare to its present state. In particular, it looks at how the events of September 11th 2001 have redefined warfare and the impact of that revolution on the traditional NCW concept. This chapter also focuses on the advantages and disadvantages of NCW which have now been proven through the experiences of Operation Enduring Freedom and Operation Iraqi Freedom. These two conflicts have been described as the first information technology wars of the 21st century. Chapter Four focuses on how the concept of Network Centric Warfare has and will affect the specifics of personnel and make-up of the New Zealand Defence Force, as it makes the transition from a Platform centric to a Network Centric approach in warfare. The special focus in this chapter is on the New Zealand Army. The concepts of the ethos and cultural identity of a force are introduced here, with a view to revealing the influences that the adaptation of NCW methods and techniques can have on the organisation of that force. The discussion concludes that the introduction of NCW can have profound and permanent effect on a force's ethos and identity. This chapter also considers the influence of technology can help in the recruitment and retention of highly skilled people in the Army. Chapter Five shows how the adoption of the concept of Network Centric warfare also has the potential to fundamentally change the way in which higher level policy and doctrine are introduced and modified in the Armed Forces. This chapter looks at how future infrastructure and policies will need to have increased flexibility built into them from the start in order to embrace the demands of NCW for rapid developments in information technology and force-wide diffusion of such developments. Chapter Six discusses a third important consequence of adopting the concept of Network Centric Warfare. Namely, how the introduction of NCW will affect both training and education of service personnel. In particular, it examines how the change from Platform Centric to Network Centric forms of warfare puts changing demands on the skill sets and needs required of service personnel. Examples are given of the new skill sets needed in order for them to work effectively in a NCW environment. Chapter Seven discusses the formation of a new training branch of service which will need to be set up to accommodate the new methods and skills that NCW brings to the battlefield. Included in this chapter are the imperatives of Information Warfare, Electronic Warfare, and Computer Network Operations for such a branch. Alongside Air, Land, Sea and Space NCW brings with it the creation of a fifth battle space. This battle-space is cyberspace which encompasses the electromagnetic sphere, the Internet and all manner of Wide and Local Area Networks (WANs and LANs). Chapter Eight returns to the issue of training and education introduced in Chapter Six, but focuses specifically on the use of simulation techniques and technologies. Such techniques will be required in order to help train soldiers to work effectively and efficiently under NCW. Why other training methods won't work well given an NCW environment, and why simulation technologies will work, is explained with examples of each. This chapter argues in particular that simulation provides the most effective training in the unified data architecture that will be needed to provide cross platform capability and inter and intra service solutions in Network Centric Warfare. Examples of data solutions are provided to help explain the underlying simulation concepts and methods. Chapter Nine is the conclusion of this study. It reviews the results of this thesis and provides recommendations on the implementation of the Network Centric Warfare environment required in the New Zealand Armed Forces

    On Modeling Geometric Joint Sink Mobility with Delay-Tolerant Cluster-less Wireless Sensor Networks

    Full text link
    Moving Sink (MS) in Wireless Sensor Networks (WSNs) has appeared as a blessing because it collects data directly from the nodes where the concept of relay nodes is becomes obsolete. There are, however, a few challenges to be taken care of, like data delay tolerance and trajectory of MS which is NP-hard. In our proposed scheme, we divide the square field in small squares. Middle point of the partitioned area is the sojourn location of the sink, and nodes around MS are in its transmission range, which send directly the sensed data in a delay-tolerant fashion. Two sinks are moving simultaneously; one inside and having four sojourn locations and other in outer trajectory having twelve sojourn locations. Introduction of the joint mobility enhances network life and ultimately throughput. As the MS comes under the NP-hard problem, we convert it into a geometric problem and define it as, Geometric Sink Movement (GSM). A set of linear programming equations has also been given in support of GSM which prolongs network life time
    corecore