73 research outputs found

    Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation

    Get PDF
    The journey of underwater communication which began from Leonardo’s era took four and a half centuries to find practical applications for military purposes during World War II. However, over the last three decades, underwater acoustic communications witnessed a massive development due to the advancements in the design of underwater communicating peripherals and their supporting protocols. Successively, doors are opened for a wide range of applications to employ in the underwater environment, such as oceanography, pollution monitoring, offshore exploration, disaster prevention, navigation assistance, monitoring, coastal patrol and surveillance. Different applications may have different characteristics and hence, may require different network architectures. For instance, routing protocols designed for unpartitioned multi-hop networks are not suitable for Delay-Tolerant Networks. Furthermore, single-hop networks do not need routing protocols at all. Therefore, before developing a protocol one must study the network architecture properly and design it accordingly. There are several other factors which should also be considered with the network architecture while designing an efficient protocol for underwater networks, such as long propagation delay, limited bandwidth, limited battery power, high bit error rate of the channel and several other adverse properties of the channel, such as, multi-path, fading and refractive behaviors. Moreover, the environment also has an impact on the performance of the protocols designed for underwater networks. Even temperature changes in a single day have an impact on the performance of the protocols. A good protocol designed for any network should consider some or all of these characteristics to achieve better performance. In this thesis, we first discuss the impact of the environment on the performance of MAC and routing protocols. From our investigation, we discover that even temperature changes within a day may affect the sound speed profile and hence, the channel changes and the protocol performance vary. After that we discuss several protocols which are specifically designed for underwater acoustic networks to serve different purposes and for different network architectures. Underwater Selective Repeat (USR) is an error control protocol designed to assure reliable data transmission in the MAC layer. One may suspect that employing an error control technique over a channel which already suffers from long propagation delays is a burden. However, USR utilizes long propagation by transmitting multiple packets in a single RTT using an interlacing technique. After USR, a routing protocol for surveillance networks is discussed where some sensors are laid down at the bottom of the sea and some sinks are placed outside the area. If a sensor detects an asset within its detection range, it announces the presence of intruders by transmitting packets to the sinks. It may happen that the discovered asset is an enemy ship or an enemy submarine which creates noise to jam the network. Therefore, in surveillance networks, it is necessary that the protocols have jamming resistance capabilities. Moreover, since the network supports multiple sinks with similar anycast address, we propose a Jamming Resistance multi-path Multi-Sink Routing Protocol (MSRP) using a source routing technique. However, the problem of source routing is that it suffers from large overhead (every packet includes the whole path information) with respect to other routing techniques, and also suffers from the unidirectional link problem. Therefore, another routing protocol based on a distance vector technique, called Multi-path Routing with Limited Cross-Path Interference (L-CROP) protocol is proposed, which employs a neighbor-aware multi-path discovery algorithm to support low interference multiple paths between each source-destination pair. Following that, another routing protocol is discussed for next generation coastal patrol and surveillance network, called Underwater Delay-Tolerant Network (UDTN) routing where some AUVs carry out the patrolling work of a given area and report to a shore based control-center. Since the area to be patrolled is large, AUVs experience intermittent connectivity. In our proposed protocol, two nodes that understand to be in contact with each other calculate and divide their contact duration equally so that every node gets a fair share of the contact duration to exchange data. Moreover, a probabilistic spray technique is employed to restrict the number of packet transmissions and for error correction a modified version of USR is employed. In the appendix, we discuss a framework which was designed by our research group to realize underwater communication through simulation which is used in most of the simulations in this thesis, called DESERT Underwater (short for DEsign, Simulate, Emulate and Realize Test-beds for Underwater network protocols). It is an underwater extension of the NS-Miracle simulator to support the design and implementation of underwater network protocols. Its creation assists the researchers in to utilizing the same codes designed for the simulator to employ in actual hardware devices and test in the real underwater scenario

    Collab-SAR:A Collaborative Avalanche Search-and-Rescue Missions Exploiting Hostile Alpine Networks

    Get PDF
    Every year, Alpine experiences a considerable number of avalanches causing danger to visitor and saviors, where most of the existing techniques to mitigate the number of fatalities in such hostile environments are based on a non-collaborative approach and is time- and effort-inefficient. A recently completed European project on Smart collaboration between Humans and ground-aErial Robots for imProving rescuing activities in Alpine environments (SHERPA) has proposed a novel collaborative approach to improve the rescuing activities. To be an integral part of the SHERPA framework, this paper considers deployment of an air-ground collaborative wireless network (AGCWN) to support search and rescue (SAR) missions in hostile alpine environments. We propose a network infrastructure for such challenging environments by considering the available network components, hostility of the environments, scenarios, and requirements. The proposed infrastructure also considers two degrees of quality of service, in terms of high throughput and long coverage range, to enable timely delivery of videos and images of the long patrolled area, which is the key in any searching and rescuing mission. We also incorporate a probabilistic search technique, which is suitable for collaborative search assuming AGCWN infrastructure for sharing information. The effectiveness of the proposed infrastructure and collaborative search technique, referred to as Collab-SAR, is demonstrated via a series of computer simulations. The results confirm the effectiveness of the proposal

    Exploiting Privacy-Policy and -Management Features on Social Networks: A User's Perspective

    Get PDF
    A social network is a type of media that allows users to engage social interaction in the cyber world. Nowadays, this network becomes a backbone of the digital communication world as it transformed the way of information being shared across the different communities. Exploiting this network, people can easily share huge volume of information (e.g., text, audio and video) without paying any charge that runs to gain overwhelming popularity of it. Nevertheless, it is an important issue for the users to select the privacy options for their information, resulting in the decision making on who can access the information and how the information should be used. This decision can be made via privacy management features within the social networks' applications. However, the lack of study to explain the perceived use of privacy policies and management features, among social networks' users, has conjured up the significant concerns about how social network users felt about the use of these features in social networks. To address this issue, in this paper, an empirical study has been conducted to seek for users' feedbacks on the use of existing privacy policies and management features of social networks. These feedback assist in improving further the social network users' privacy features

    Region-Based Distance Analysis of Keyphrases: A New Unsupervised Method for Extracting Keyphrases Feature from Articles

    Get PDF
    Due to the exponential growth of information’s and web sources, Automatic keyphrase extraction is still a challenging issue in the current research area. Keyphrases are very helpful for several tasks in natural language processing (NLP) and information retrieval (IR) systems. Feature extractions for those keyphrases execute a vital role in extracting the top-quality keyphrases and summarising the documents at a superior level. This paper proposes a new region-based distance analysis of keyphrases (RDAK) unsupervised technique for feature extraction of keyphrases from articles. The proposed method comprises six phases: data acquisition and preprocessing, data processing, distance calculation, average distance, curve plotting, and curve fitting. At first, the system inputs the collected different datasets to the preprocessing step by employing some text preprocessing techniques. Afterwards, the preprocessed data is applied to the data processing phase, and then after distance calculation, it is passed to the region-based average calculation process, then curve plotting analysis, and afterwards, the curve fitting technique is utilized. Finally, the proposed system has tested and evaluated the performance through implementing them on benchmark datasets. The proposed system will significantly improve the performance of existing keyphrase extraction techniques

    Raising Fairness Issue of Vehicle Routing Problem

    Get PDF
    Since fairness deals with the quality of distributing the jobs and creates an ambience that is free from any discrimination, any distribution management problem must take fairness issue into consideration. Again, since the Vehicle Routing Problem (VRP) is also a distribution management problem, any VRP solving algorithm must consider the fairness when solutions are explored. However, most of the proposed VRP solving algorithms do not take this issue into consideration. In this paper, we raise this issue with sufficient evidences. In this course of action, following contributions are made in this paper: i) fairness issue is raised analytically, and to support this, an extensive simulation campaign is performed, ii) the VRP is discussed through a practical application, namely Garbage Collection Problem (GCP), and later it is mathematically formulated, iii) a Genetic Algorithm (GA) is employed to explore feasible solutions for the given application (i.e., GCP), and iv) some future research directives are noted, which will help the researchers to extend this work
    corecore